E-Book, Englisch, Band 323, 388 Seiten, eBook
Reihe: IFIP Advances in Information and Communication Technology
Calude / Sassone Theoretical Computer Science
Erscheinungsjahr 2010
ISBN: 978-3-642-15240-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
6th IFIP WG 2.2 International Conference, TCS 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings
E-Book, Englisch, Band 323, 388 Seiten, eBook
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-3-642-15240-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Weitere Infos & Material
Convexity, Duality and Effects.- A Calculus for Power-Aware Multicast Communications in Ad Hoc Networks.- The Coarsest Precongruences Respecting Safety and Liveness Properties.- Entropy and Attack Models in Information Flow.- Safe Equivalences for Security Properties.- On Probabilistic Alternating Simulations.- Probabilistic Mobility Models for Mobile and Wireless Networks.- On Packing Splittable Items with Cardinality Constraints.- Deterministic Computations in Time-Varying Graphs: Broadcasting under Unstructured Mobility.- Slicing Behavior Tree Models for Verification.- Optimization of the Anisotropic Gaussian Kernel for Text Segmentation and Parameter Extraction.- Online Dictionary Matching for Streams of XML Documents.- The Duality of Computation under Focus.- Polarized Resolution Modulo.- A Logic on Subobjects and Recognizability.- Terminating Tableaux for with Number Restrictions on Transitive Roles.- Proof System for Applied Pi Calculus.- Concurrent Pattern Calculus.- Initial Segment Complexities of Randomness Notions.- Topologies Refining the Cantor Topology on X ? .- On Symbolic Representations of Maximum Matchings and (Un)directed Graphs.- Traceable Sets.- Approximating the Non-contiguous Multiple Organization Packing Problem.- Improving the Competitive Ratios of the Seat Reservation Problem.- A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis.- A Game-Theoretic Approach to Routing under Adversarial Conditions.- An Operational Model for Multiprocessors with Caches.