Sciweavers

1559 search results - page 18 / 312
» Some Group Theory Problems
Sort
View
RTA
2005
Springer
15 years 3 months ago
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Pascal Lafourcade, Denis Lugiez, Ralf Treinen
JCT
2010
63views more  JCT 2010»
14 years 8 months ago
Cyclic sieving, promotion, and representation theory
We prove a collection of conjectures of D. White [37], as well as some related conjectures of Abuzzahab-Korson-Li-Meyer [1] and of Reiner and White [21], [37], regarding the cyclic...
Brendon Rhoades
CP
2005
Springer
15 years 3 months ago
Breaking All Value Symmetries in Surjection Problems
We propose a surprisingly simple new way of breaking all value symmetries with constraints. Our method requires the addition of one variable per value of the problem plus a linear ...
Jean-Francois Puget
71
Voted
CHI
2009
ACM
15 years 4 months ago
Understanding why we preserve some things and discard others in the context of interaction design
This paper takes up the problem of understanding why we preserve some things passionately and discard others without thought. We briefly report on the theoretical literature relat...
William Odom, James Pierce, Erik Stolterman, Eli B...
69
Voted
AIED
2005
Springer
15 years 3 months ago
The role of learning goals in the design of ILEs: Some issues to consider
Part of the motivation behind the evolution of learning environments is the idea of providing students with individualized instructional strategies that allow them to learn as much...
Erika Martínez-Mirón, Amanda Harris,...