Sciweavers

485 search results - page 57 / 97
» Iterative Bounding LAO
Sort
View
139
Voted
STACS
2007
Springer
15 years 11 months ago
On the Automatic Analysis of Recursive Security Protocols with XOR
Abstract. In many security protocols, such as group protocols, principals have to perform iterative or recursive computations. We call such protocols recursive protocols. Recently,...
Ralf Küsters, Tomasz Truderung
127
Voted
WG
2007
Springer
15 years 11 months ago
Obtaining a Planar Graph by Vertex Deletion
In the Planar +k vertex problem the task is to find at most k vertices whose deletion makes the given graph planar. The graphs for which there exists a solution form a minor close...
Dániel Marx, Ildikó Schlotter
127
Voted
GLOBECOM
2006
IEEE
15 years 11 months ago
On the Parallelism of Convolutional Turbo Decoding and Interleaving Interference
— In forward error correction, convolutional turbo codes were introduced to increase error correction capability approaching the Shannon bound. Decoding of these codes, however, ...
Olivier Muller, Amer Baghdadi, Michel Jéz&e...
120
Voted
XIMEP
2005
ACM
126views Database» more  XIMEP 2005»
15 years 10 months ago
Purely Relational FLWORs
We report on a compilation procedure that derives relational algebra plans from arbitrarily nested XQuery FLWOR blocks. While recent research was able to develop relational encodi...
Torsten Grust
ICDCIT
2005
Springer
15 years 10 months ago
Analyzing Loop Paths for Execution Time Estimation
Abstract. Statically estimating the worst case execution time of a program is important for real-time embedded software. This is difficult even in the programming language level du...
Abhik Roychoudhury, Tulika Mitra, Hemendra Singh N...