Sciweavers

6149 search results - page 1067 / 1230
» Revealing the programming process
Sort
View
RTA
2005
Springer
15 years 10 months ago
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Pascal Lafourcade, Denis Lugiez, Ralf Treinen
STACS
2005
Springer
15 years 10 months ago
Cycle Cover with Short Cycles
Cycle covering is a well-studied problem in computer science. In this paper, we develop approximation algorithms for variants of cycle covering problems which bound the size and/o...
Nicole Immorlica, Mohammad Mahdian, Vahab S. Mirro...
175
Voted
GECCO
2005
Springer
150views Optimization» more  GECCO 2005»
15 years 10 months ago
A GA for maximum likelihood phylogenetic inference using neighbour-joining as a genotype to phenotype mapping
Evolutionary relationships among species can be represented by a phylogenetic tree and inferred by optimising some measure of fitness, such as the statistical likelihood of the t...
Leon Poladian
122
Voted
SIGUCCS
2004
ACM
15 years 10 months ago
Window to a new world: online freshman orientation via portal
In June 2003, Lehigh University embarked on an experiment to present incoming freshmen with an online pre-orientation experience using the SCT Luminis 3 Portal environment. Three ...
Sherri Yerk-Zwickl
WOSP
2004
ACM
15 years 10 months ago
Software performance modelling using PEPA nets
Modelling and analysing distributed and mobile software systems is a challenging task. PEPA nets—coloured stochastic Petri nets—are a recently introduced modelling formalism w...
Stephen Gilmore, Jane Hillston, Leïla Kloul, ...
« Prev « First page 1067 / 1230 Last » Next »