Sciweavers

523 search results - page 63 / 105
» On the Power of Quantum Proofs
Sort
View
GLOBECOM
2008
IEEE
15 years 6 months ago
Tight Bounds of the Generalized Marcum Q-Function Based on Log-Concavity
—In this paper, we manage to prove the log-concavity of the generalized Marcum Q-function Qν (a, b) with respect to its order ν on [1, ∞). The proof relies on a powerful math...
Yin Sun, Shidong Zhou
AB
2007
Springer
15 years 6 months ago
Manifestation and Exploitation of Invariants in Bioinformatics
Whenever a programmer writes a loop, or a mathematician does a proof by induction, an invariant is involved. The discovery and understanding of invariants often underlies problem s...
Limsoon Wong
ASM
2005
ASM
15 years 5 months ago
AsmL Semantics in Fixpoint
AsmL is a novel executable specification language based on the theory of State Machines (ASMs). It represents one of the most powerful practical engines to write and execute ASMs...
Ali Habibi, Sofiène Tahar
WAOA
2004
Springer
107views Algorithms» more  WAOA 2004»
15 years 5 months ago
Order-Preserving Transformations and Greedy-Like Algorithms
Borodin, Nielsen and Rackoff [5] proposed a framework for ing the main properties of greedy-like algorithms with emphasis on scheduling problems, and Davis and Impagliazzo [6] ext...
Spyros Angelopoulos
ACISP
2008
Springer
15 years 1 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...