Sciweavers

804 search results - page 85 / 161
» On the Termination of the Chase Algorithm
Sort
View
141
Voted
CSFW
1999
IEEE
15 years 4 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
102
Voted
RTA
2010
Springer
15 years 4 months ago
Computing Critical Pairs in 2-Dimensional Rewriting Systems
Rewriting systems on words are very useful in the study of monoids. In good cases, they give finite presentations of the monoids, allowing their manipulation by a computer. Even b...
Samuel Mimram
89
Voted
BIOCOMP
2008
15 years 2 months ago
Discoveries in shRNA Design
-- To successfully apply RNAi, the very first step is to design functional siRNA or shRNA sequences targeting specific genes. Many characteristics of functional synthetic siRNAs ha...
Hong Zhou, Xiao Zeng, Joseph Manthey
117
Voted
SIAMDM
2010
113views more  SIAMDM 2010»
14 years 7 months ago
The VPN Problem with Concave Costs
We consider the following network design problem. We are given an undirected network with costs on the edges, a set of terminals, and an upper bound for each terminal limiting the ...
Samuel Fiorini, Gianpaolo Oriolo, Laura Sanit&agra...
122
Voted
WDAG
2010
Springer
233views Algorithms» more  WDAG 2010»
14 years 11 months ago
Minimum Dominating Set Approximation in Graphs of Bounded Arboricity
Abstract. Since in general it is NP-hard to solve the minimum dominating set problem even approximatively, a lot of work has been dedicated to central and distributed approximation...
Christoph Lenzen, Roger Wattenhofer