Sciweavers

3318 search results - page 443 / 664
» The Weak Instance Model
Sort
View
LICS
2003
IEEE
15 years 9 months ago
An NP Decision Procedure for Protocol Insecurity with XOR
We provide a method for deciding the insecurity of cryptographic protocols in presence of the standard Dolev-Yao intruder (with a finite number of sessions) extended with so-call...
Yannick Chevalier, Ralf Küsters, Michaël...
ESA
2003
Springer
90views Algorithms» more  ESA 2003»
15 years 9 months ago
Packing a Trunk
We report on a project with a German car manufacturer. The task is to compute (approximate) solutions to a specific large-scale packing problem. Given a polyhedral model of a car ...
Friedrich Eisenbrand, Stefan Funke, Joachim Reiche...
AMT
2001
Springer
191views Multimedia» more  AMT 2001»
15 years 8 months ago
An Authoring Tool for Building Adaptive Learning Guidance Systems on the Web
In the field of guided learning on the Internet we present, in this paper, an interactive tool for designing intelligent tutoring systems on the web. Our tool makes easier the crea...
José Antonio Macías Iglesias, Pablo ...
EUROPAR
2001
Springer
15 years 8 months ago
Optimal Many-to-One Routing on the Mesh with Constant Queues
We present randomized and deterministic algorithms for many-to-one routing on an n-node two-dimensional mesh under the store-and-forward model of packet routing. We consider the g...
Andrea Pietracaprina, Geppino Pucci
GI
2001
Springer
15 years 8 months ago
Specifying Component Invariants with OCL
The “Object Constraint Language” (OCL) offers a formal notation for constraining model elements in UML diagrams. OCL consists of a navigational expression language which, for ...
Rolf Hennicker, Hubert Baumeister, Alexander Knapp...