Sciweavers

709 search results - page 99 / 142
» In-stroke word completion
Sort
View
ENTCS
2006
122views more  ENTCS 2006»
14 years 12 months ago
Verification of Clock Synchronization Algorithms: Experiments on a Combination of Deductive Tools
We report on an experiment in combining Isabelle with automatic first-order arithmetic provers to increase automation on the verification of distributed protocols. As a case study...
Damián Barsotti, Leonor Prensa Nieto, Alwen...
ENTCS
2006
109views more  ENTCS 2006»
14 years 12 months ago
Incremental Verification for On-the-Fly Controller Synthesis
The CIRCA system automatically synthesizes hard real-time discrete event controllers from plant and environment descriptions. CIRCA's automatically-synthesized controllers pr...
David J. Musliner, Michael J. S. Pelican, Robert P...
ENTCS
2006
113views more  ENTCS 2006»
14 years 12 months ago
Mining Propositional Simplification Proofs for Small Validating Clauses
The problem of obtaining small conflict clauses in SMT systems has received a great deal of attention recently. We report work in progress to find small subsets of the current par...
Ian Wehrman, Aaron Stump
CAGD
2007
86views more  CAGD 2007»
14 years 11 months ago
A general geometric construction of coordinates in a convex simplicial polytope
Barycentric coordinates are a fundamental concept in computer graphics and geometric modeling. We extend the geometric construction of Floater’s mean value coordinates [8,11] to...
Tao Ju, Peter Liepa, Joe D. Warren
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
14 years 11 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang