Sciweavers

234 search results - page 11 / 47
» Examples of Termination
Sort
View
FC
2005
Springer
80views Cryptology» more  FC 2005»
15 years 5 months ago
A User-Friendly Approach to Human Authentication of Messages
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Jeff King, André L. M. dos Santos
ACSW
2003
15 years 1 months ago
Security in Mobile Communications: Challenges and Opportunities
The nature of mobile communication, characterised for example by terminals having poor user interface and limited processing capacity, as well as complex combination of network pr...
Audun Jøsang, Gunnar Sanderud
ICLP
1999
Springer
15 years 4 months ago
Bounded Nondeterminism of Logic Programs
We introduce the notion of bounded nondeterminism for logic programs and queries. A program and a query have bounded nondeterminism if there are finitely many refutations for the...
Dino Pedreschi, Salvatore Ruggieri
IMR
2004
Springer
15 years 5 months ago
Inverse Pre-Deformation of Finite Element Mesh for Large Deformation Analysis
In the finite element analysis that deals with large deformation, the process usually produces distorted elements at the later stages of the analysis. These distorted elements lea...
Arbtip Dheeravongkit, Kenji Shimada
TCS
2008
14 years 11 months ago
Loop detection in term rewriting using the eliminating unfoldings
In this paper, we present a fully automatizable approach to detecting loops in standard term rewriting. Our method is based on semi-unification and an unfolding operation which pr...
Étienne Payet