Sciweavers

523 search results - page 84 / 105
» On the Power of Quantum Proofs
Sort
View
SADFE
2008
IEEE
15 years 6 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
SAINT
2008
IEEE
15 years 6 months ago
Matrix Routing -- An Interference Range Insensitive Routing Protocol for Wireless Sensor Networks
Interference ranges can dramatically affect the throughput in wireless sensor networks. While the transmission range defines the maximum physical range of a radio signal the inter...
Monty Beuster, Michael Beigl, Daniel Röhr, Ti...
ESCIENCE
2007
IEEE
15 years 6 months ago
GridR: An R-Based Grid-Enabled Tool for Data Analysis in ACGT Clinico-Genomics Trials
In this paper, we describe an analysis tool based on the statistical environment R, GridR, which allows using the collection of methodologies available as R packages in a grid env...
Dennis Wegener, Thierry Sengstag, Stelios Sfakiana...
LICS
2007
IEEE
15 years 6 months ago
Alternation-free modal mu-calculus for data trees
d abstract) Marcin Jurdzi´nski and Ranko Lazi´c∗ Department of Computer Science, University of Warwick, UK An alternation-free modal µ-calculus over data trees is introduced ...
Marcin Jurdzinski, Ranko Lazic
LICS
2007
IEEE
15 years 6 months ago
A Dependent Set Theory
Set theories are traditionally based on first-order logic. We show that in a constructive setting, basing a set theory on a dependent logic yields many benefits. To this end, we...
Wojciech Moczydlowski