Sciweavers

485 search results - page 57 / 97
» Iterative Bounding LAO
Sort
View
81
Voted
STACS
2007
Springer
15 years 4 months ago
On the Automatic Analysis of Recursive Security Protocols with XOR
Abstract. In many security protocols, such as group protocols, principals have to perform iterative or recursive computations. We call such protocols recursive protocols. Recently,...
Ralf Küsters, Tomasz Truderung
WG
2007
Springer
15 years 4 months ago
Obtaining a Planar Graph by Vertex Deletion
In the Planar +k vertex problem the task is to find at most k vertices whose deletion makes the given graph planar. The graphs for which there exists a solution form a minor close...
Dániel Marx, Ildikó Schlotter
77
Voted
GLOBECOM
2006
IEEE
15 years 4 months ago
On the Parallelism of Convolutional Turbo Decoding and Interleaving Interference
— In forward error correction, convolutional turbo codes were introduced to increase error correction capability approaching the Shannon bound. Decoding of these codes, however, ...
Olivier Muller, Amer Baghdadi, Michel Jéz&e...
74
Voted
XIMEP
2005
ACM
126views Database» more  XIMEP 2005»
15 years 3 months ago
Purely Relational FLWORs
We report on a compilation procedure that derives relational algebra plans from arbitrarily nested XQuery FLWOR blocks. While recent research was able to develop relational encodi...
Torsten Grust
106
Voted
ICDCIT
2005
Springer
15 years 3 months ago
Analyzing Loop Paths for Execution Time Estimation
Abstract. Statically estimating the worst case execution time of a program is important for real-time embedded software. This is difficult even in the programming language level du...
Abhik Roychoudhury, Tulika Mitra, Hemendra Singh N...