Sciweavers

37 search results - page 4 / 8
» mst 2008
Sort
View
91
Voted
MST
2008
118views more  MST 2008»
15 years 6 days ago
Risk Assessment for One-Counter Threads
Abstract Threads as contained in a thread algebra are used for the modeling of sequential program behavior. A thread that may use a counter to control its execution is called a `on...
Alban Ponse, Mark van der Zwaag
111
Voted
MST
2008
120views more  MST 2008»
15 years 6 days ago
Bounds on Sizes of Finite Bisimulations of Pfaffian Dynamical Systems
We study finite bisimulations of dynamical systems in Rn defined by Pfaffian maps. The pure existence of finite bisimulations for a more general class of o-minimal systems was show...
Margarita V. Korovina, Nicolai Vorobjov
69
Voted
MST
2008
80views more  MST 2008»
15 years 6 days ago
A Revised Transformation Protocol for Unconditionally Secure Secret Key Exchange
Abstract The transformation protocol can allow two players to share an unconditionally secure secret key using a random deal of cards. A sufficient condition on the number of cards...
Koichi Koizumi, Takaaki Mizuki, Takao Nishizeki
92
Voted
DIALM
2008
ACM
135views Algorithms» more  DIALM 2008»
15 years 2 months ago
Symmetric range assignment with disjoint MST constraints
If V is a set of n points in the unit square [0, 1]2 , and if R : V + is an assignment of positive real numbers (radii) to to those points, define a graph G(R) as follows: {v, w}...
Eric Schmutz