Sciweavers

3608 search results - page 344 / 722
» computing 2011
Sort
View
CORR
2011
Springer
216views Education» more  CORR 2011»
15 years 3 days ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
CORR
2011
Springer
169views Education» more  CORR 2011»
15 years 3 days ago
Lower bound for deterministic semantic-incremental branching programs solving GEN
We answer a problem posed in [GKM08] regarding a restricted model of small-space computation, tailored for solving the GEN problem. They define two variants of “incremental bra...
Dustin Wehr
CORR
2011
Springer
137views Education» more  CORR 2011»
15 years 3 days ago
Existential witness extraction in classical realizability and via a negative translation
Abstract. We show how to extract existential witnesses from classical proofs using Krivine’s classical realizability—where classical proofs are interpreted as λ-terms with the...
Alexandre Miquel
CORR
2011
Springer
159views Education» more  CORR 2011»
15 years 3 days ago
Multicriteria Steiner Tree Problem for Communication Network
Abstract—This paper addresses combinatorial optimization schemes for solving the multicriteria Steiner tree problem for communication network topology design (e.g., wireless mesh...
Mark Sh. Levin, Rustem I. Nuriakhmetov
CORR
2011
Springer
176views Education» more  CORR 2011»
15 years 3 days ago
Maximizing Cloud Providers Revenues via Energy Aware Allocation Policies
—Cloud providers, like Amazon, offer their data centers’ computational and storage capacities for lease to paying customers. High electricity consumption, associated with runni...
Michele Mazzucco, Dmytro Dyachuk, Ralph Deters