Sciweavers

1192 search results - page 5 / 239
» Computing Weakest Readings
Sort
View
92
Voted
BIRTHDAY
2012
Springer
13 years 7 months ago
How to Read a Signature?
In this note we describe a cryptographic curiosity: readable messages that carry their own digital signature.
Vanessa Gratzer, David Naccache
ECAI
2008
Springer
15 years 23 days ago
Regression for Classical and Nondeterministic Planning
Many forms of reasoning about actions and planning can be reduced to regression, the computation of the weakest precondition a state has to satisfy to guarantee the satisfaction of...
Jussi Rintanen
COMPUTER
1999
69views more  COMPUTER 1999»
14 years 11 months ago
As We May Read: The Reading Appliance Revolution
Bill N. Schilit, Morgan N. Price, Gene Golovchinsk...
ICPADS
1998
IEEE
15 years 3 months ago
Fast Mutual Exclusion Algorithms Using Read-Modify-Write and Atomic Read/Write Registers
: Three fast mutual exclusion algorithms using read-modify-write and atomic read/write registers are presented in a sequence, with an improvement from one to the next. The last alg...
Ting-Lu Huang