Sciweavers

635 search results - page 41 / 127
» Some Computational Problems Related to Pseudo-intents
Sort
View
135
Voted
ALGORITHMICA
2011
14 years 4 months ago
All-Pairs Bottleneck Paths in Vertex Weighted Graphs
Let G = (V, E, w) be a directed graph, where w : V → R is an arbitrary weight function defined on its vertices. The bottleneck weight, or the capacity, of a path is the smalles...
Asaf Shapira, Raphael Yuster, Uri Zwick
JCS
2008
109views more  JCS 2008»
14 years 9 months ago
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete
The secrecy problem for security protocols is the problem to decide whether or not a given security protocol has leaky runs. In this paper, the (initial) secrecy problem for bound...
Ferucio Laurentiu Tiplea, Catalin V. Birjoveanu, C...
ITICSE
2006
ACM
15 years 3 months ago
Identifying novice difficulties in object oriented design
We report on a study of novice programmers’ object oriented class designs. These designs were analysed to discover what faults they displayed. The two most common faults related...
Benjy J. Thomasson, Mark Ratcliffe, Lynda Thomas
DSRT
2000
IEEE
15 years 2 months ago
A Generic Rollback Manager for Optimistic HLA Simulations
This paper describes the addition of an extra piece of software, a rollback manager, to implement state saving and rollback management for optimistic federates in the High Level A...
Fernando Vardânega, Carlos Maziero
PODS
1999
ACM
153views Database» more  PODS 1999»
15 years 2 months ago
Consistent Query Answers in Inconsistent Databases
In this paper we consider the problem of the logical characterization of the notion of consistent answer in a relational database that may violate given integrity constraints. Thi...
Marcelo Arenas, Leopoldo E. Bertossi, Jan Chomicki