Path-based distance functions in n-dimensional generalizations of the face- and body-centered cubic grids Fulltext Access 15 Pages 2009
Verifying Communication Protocols Using Live Sequence Chart Specifications Fulltext Access 16 Pages 2009
The Tractability of Model-checking for LTL: The Good, the Bad, and the Ugly Fragments Fulltext Access 16 Pages 2009
Completeness and Correspondence in Hybrid Logic via an Extension of SQEMA Fulltext Access 16 Pages 2009
Improved Continuous Approximation of PEPA Models through Epidemiological Examples Fulltext Access 16 Pages 2009
Equational Abstractions for Reducing the State Space of Rewrite Theories Fulltext Access 16 Pages 2009
Decompositions and statistics for β(1,0)-trees and nonseparable permutations Fulltext Access 16 Pages 2009
Cutting plane algorithms for solving a stochastic edge-partition problem Fulltext Access 16 Pages 2009
New algorithms for convex cost tension problem with application to computer vision Fulltext Access 16 Pages 2009
Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol Fulltext Access 16 Pages 2009
Refinement Sensitive Formal Semantics of State Machines With Persistent Choice Fulltext Access 16 Pages 2009
A Semantic Condition for Data Independence and Applications in Hardware Verification Fulltext Access 16 Pages 2009
Algorithms and Complexity of Automata Synthesis by Asynhcronous Orchestration With Applications to Web Services Composition Fulltext Access 16 Pages 2009
Tool Support for Holistic Modelling of Distributed Embedded Systems in Creol Fulltext Access 16 Pages 2009
Cost Relation Systems: A Language-Independent Target Language for Cost Analysis Fulltext Access 16 Pages 2009
jSynoPSys – A Scenario-Based Testing Tool based on the Symbolic Animation of B Machines Fulltext Access 16 Pages 2009
Model-based Kernel Testing for Concurrency Bugs through Counter Example Replay Fulltext Access 16 Pages 2009
Simploidals sets: Definitions, operations and comparison with simplicial sets Fulltext Access 16 Pages 2009
The complexity of minimizing the number of shape matrices subject to minimal beam-on time in multileaf collimator field decomposition with bounded fluence Fulltext Access 16 Pages 2009
On the approximability of the Maximum Agreement SubTree and Maximum Compatible Tree problems Fulltext Access 16 Pages 2009
Approximation algorithms for constrained generalized tree alignment problem Fulltext Access 16 Pages 2009
Towards a definition of higher order constrained Delaunay triangulations Fulltext Access 16 Pages 2009
Adaptive Latency Insensitive Protocols and Elastic Circuits with Early Evaluation: A Comparative Analysis Fulltext Access 16 Pages 2009
Operational Termination of Conditional Rewriting with Built-in Numbers and Semantic Data Structures Fulltext Access 16 Pages 2009
Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives Fulltext Access 16 Pages 2009
A Resource-Aware Semantics and Abstract Machine for a Functional Language with Explicit Deallocation Fulltext Access 16 Pages 2009
Using CLP Simplifications to Improve Java Bytecode Termination Analysis Fulltext Access 16 Pages 2009
Reconstruction of Partial Orders and List Representation as Random Structures Fulltext Access 16 Pages 2009
Definite Descriptions and Dijkstra's Odd Powers of Odd Integers Problem Fulltext Access 16 Pages 2009