Sciweavers

1307 search results - page 187 / 262
» Follow the intellectual property
Sort
View
CORR
2008
Springer
112views Education» more  CORR 2008»
14 years 10 months ago
Canonical calculi with (n,k)-ary quantifiers
Propositional canonical Gentzen-type systems, introduced in [2], are systems which in addition to the standard axioms and structural rules have only logical rules in which exactly ...
Arnon Avron, Anna Zamansky
IM
2008
14 years 9 months ago
Fast and Efficient Restricted Delaunay Triangulation in Random Geometric Graphs
Let G = G(n, r) be a random geometric graph resulting from placing n nodes uniformly at random in the unit square (disk) and connecting every two nodes if and only if their Euclide...
Chen Avin
ISI
2008
Springer
14 years 9 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
IJHPCN
2006
106views more  IJHPCN 2006»
14 years 9 months ago
Hash chains with diminishing ranges for sensors
Sensors and other small devices that periodically transmit relatively small packets of information motivate the study of hash chains with small domains and ranges. Hash chain based...
Phillip G. Bradford, Olga V. Gavrylyako
CORR
2007
Springer
104views Education» more  CORR 2007»
14 years 9 months ago
Sources of Superlinearity in Davenport-Schinzel Sequences
A generalized Davenport-Schinzel sequence is one over a finite alphabet that contains no subsequences isomorphic to a fixed forbidden subsequence. One of the fundamental problem...
Seth Pettie