Sciweavers

234 search results - page 34 / 47
» Proof Nets and the Identity of Proofs
Sort
View
ACSC
2005
IEEE
15 years 3 months ago
SuperstringRep: Reputation-enhanced Service Discovery
1 Service discovery protocols are used in distributed systems to locate services for clients. The services that are located as well as the clients requesting service are commonly a...
Ryan Wishart, Ricky Robinson, Jadwiga Indulska
CSL
2005
Springer
15 years 3 months ago
Light Functional Interpretation
We give a Natural Deduction formulation of an adaptation of G¨odel’s functional (Dialectica) interpretation to the extraction of (more) efficient programs from (classical) proof...
Mircea-Dan Hernest
ICSM
2003
IEEE
15 years 3 months ago
Towards a Versioning Model for Component-based Software Assembly
The world of software development has rapidly changed in the last few years due to the adoption of component-based technologies. The classical software configuration management, ...
Jaroslav Gergic
ESA
1994
Springer
139views Algorithms» more  ESA 1994»
15 years 2 months ago
A Simple Min Cut Algorithm
We present an algorithm for finding the minimum cut of an undirected edge-weighted graph. It is simple in every respect. It has a short and compact description, is easy to implemen...
Mechthild Stoer, Frank Wagner
82
Voted
ESAS
2006
Springer
15 years 1 months ago
Cryptographic Protocol to Establish Trusted History of Interactions
In the context of ambient networks, this article describes a cryptographic protocol called Common History Extraction (CHE) protocol implementing a trust management framework. All t...
Samuel Galice, Marine Minier, John Mullins, St&eac...