Sciweavers

1192 search results - page 5 / 239
» Computing Weakest Readings
Sort
View
113
Voted
BIRTHDAY
2012
Springer
13 years 9 months ago
How to Read a Signature?
In this note we describe a cryptographic curiosity: readable messages that carry their own digital signature.
Vanessa Gratzer, David Naccache
ECAI
2008
Springer
15 years 2 months ago
Regression for Classical and Nondeterministic Planning
Many forms of reasoning about actions and planning can be reduced to regression, the computation of the weakest precondition a state has to satisfy to guarantee the satisfaction of...
Jussi Rintanen
COMPUTER
1999
69views more  COMPUTER 1999»
15 years 1 months ago
As We May Read: The Reading Appliance Revolution
Bill N. Schilit, Morgan N. Price, Gene Golovchinsk...
ICPADS
1998
IEEE
15 years 6 months ago
Fast Mutual Exclusion Algorithms Using Read-Modify-Write and Atomic Read/Write Registers
: Three fast mutual exclusion algorithms using read-modify-write and atomic read/write registers are presented in a sequence, with an improvement from one to the next. The last alg...
Ting-Lu Huang