Sciweavers

89
Voted
ITA
2007
104views Communications» more  ITA 2007»
15 years 14 days ago
Automata, Borel functions and real numbers in Pisot base
This note is about functions f : Aω → Bω whose graph is recognized by a B¨uchi finite automaton on the product alphabet A × B. These functions are Baire class 2 in the Bair...
Benoit Cagnard, Pierre Simonnet
87
Voted
ITA
2007
15 years 14 days ago
Correct rounding of algebraic functions
We explicit the link between the computer arithmetic problem of providing correctly rounded algebraic functions and some diophantine approximation issues. This allows to get bounds...
Nicolas Brisebarre, Jean-Michel Muller
101
Voted
ITA
2007
15 years 14 days ago
Three notes on the complexity of model checking fixpoint logic with chop
Abstract. This paper analyses the complexity of model checking Fixpoint Logic with Chop – an extension of the modal µ-calculus with a sequential composition operator. It uses tw...
Martin Lange
89
Voted
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
15 years 14 days ago
Complexity in scalable computing
f abstraction (hardware) to the highest (people). This issue's theme encompasses this entire spectrum. The lead author of each article resides in the Scalable Computing Resear...
Damian W. I. Rouson
SCN
2008
Springer
140views Communications» more  SCN 2008»
15 years 15 days ago
User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)
The Multimedia Broadcast Multicast Service (MBMS) has been included in the 3GGP architecture to provide broadcast/multicast services. In the 3GPP Long Term Evolution, the evolved M...
Simone Teofili, Michele Di Mascolo, Cristina Basil...
SCN
2008
Springer
104views Communications» more  SCN 2008»
15 years 15 days ago
Architecture and protocols of the future European quantum key distribution network
Mehrdad Dianati, Romain Alleaume, Maurice Gagnaire...
167
Voted
SCN
2008
Springer
147views Communications» more  SCN 2008»
15 years 15 days ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford
87
Voted
SCN
2008
Springer
105views Communications» more  SCN 2008»
15 years 15 days ago
Designing fault tolerant networks to prevent poison message failure
Xiaojiang Du, Mark A. Shayman, Ronald A. Skoog
98
Voted
SCN
2008
Springer
116views Communications» more  SCN 2008»
15 years 15 days ago
Security issues in massive online games
Jiankun Hu, Fabio Zambetta