Sciweavers

1888 search results - page 172 / 378
» Proof theory and computational analysis
Sort
View
CIE
2006
Springer
15 years 4 months ago
On Graph Isomorphism for Restricted Graph Classes
Abstract. Graph isomorphism (GI) is one of the few remaining problems in NP whose complexity status couldn't be solved by classifying it as being either NP-complete or solvabl...
Johannes Köbler
105
Voted
JSW
2008
101views more  JSW 2008»
15 years 21 days ago
Broadcast Authentication with Practically Unbounded One-way Chains
A protocol for assuring the authenticity of information broadcasted over long periods of time is proposed. The protocol is based on time synchronization and uses one-way chains con...
Bogdan Groza
67
Voted
CSE
2009
IEEE
15 years 4 months ago
Efficient Broadcast on Area of Interest in Voronoi Overlays
This paper presents an algorithm to perform the broadcasting of a packet to all the peers that are located into a convex region (Area of Interest) in a Voronoi based peer-topeer ne...
Michele Albano, Ranieri Baraglia, Matteo Mordacchi...
84
Voted
BIRTHDAY
2006
Springer
15 years 4 months ago
Research Perspectives for Logic and Deduction
The article is meant to be kind of the author's manifesto for the role of logic and deduction within Intellectics. Based on a brief analysis of this role the paper presents a...
Wolfgang Bibel

Lecture Notes
1351views
16 years 11 months ago
The Fundamental Theorem of Asset Pricing
"These lecture notes treat various versions of the so-called “fundamental theorem of asset pricing”. Many students are familiar with statements about models for financia...
Harry van Zanten