Sciweavers

258 search results - page 16 / 52
» Weak Bisimulation Approximants
Sort
View
COORDINATION
2007
Springer
15 years 6 months ago
A Calculus for Mobile Ad Hoc Networks
We suggest a Calculus for Mobile Ad Hoc Networks, CMAN. A node in a network is a processes equipped with a location, it may communicate with other nodes using synchronous local bro...
Jens Chr. Godskesen
FOSSACS
2005
Springer
15 years 5 months ago
Stochastic Transition Systems for Continuous State Spaces and Non-determinism
Abstract. We study the interaction between non-deterministic and probabilistic behaviour in systems with continuous state spaces, arbitrary probability distributions and uncountabl...
Stefano Cattani, Roberto Segala, Marta Z. Kwiatkow...
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
15 years 3 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
AUTOMATICA
2006
67views more  AUTOMATICA 2006»
14 years 12 months ago
Numerical methods for controlled regime-switching diffusions and regime-switching jump diffusions
This work is concerned with numerical methods for controlled regime-switching diffusions, and regime-switching jump diffusions. Numerical procedures based on Markov chain approxim...
Q. S. Song, Gang George Yin, Z. Zhang
ACISP
2004
Springer
15 years 5 months ago
Weak Property of Malleability in NTRUSign
A new type of signature scheme, called NTRUSign, based on solving the approximately closest vector problem in a NTRU lattice was proposed at CT-RSA’03. However no security proof ...
SungJun Min, Go Yamamoto, Kwangjo Kim