LSC Verification for UML Models with Unbounded Creation and Destruction Fulltext Access 13 Pages 2006
Observing Internet Worm and Virus Attacks with a Small Network Telescope Fulltext Access 13 Pages 2006
Convergence Routing under Bursty Traffic: Instability and an AIMD Controller 1 Fulltext Access 13 Pages 2006
Convexity in Helly Graphs: Selection and Almost Fixed Point Properties for Multifunctions Fulltext Access 13 Pages 2006
A Component Model for Separation of Control Flow from Computation in Component-Based Systems Fulltext Access 13 Pages 2006
Mining Propositional Simplification Proofs for Small Validating Clauses Fulltext Access 13 Pages 2006
An Equivalence between Dependencies in Nested Databases and a Fragment of Propositional Logic Fulltext Access 13 Pages 2006
A Logical Uniform Boundedness Principle for Abstract Metric and Hyperbolic Spaces Fulltext Access 13 Pages 2006
On Interpolation Problem in Paraconsistent Extensions of the Minimal Logic Fulltext Access 13 Pages 2006
An improvement of the construction of the D.V. and G.V. Chudnovsky algorithm for multiplication in finite fields Fulltext Access 13 Pages 2006
Deriving Available Behavior All Out from Incompatible Component Compositions Fulltext Access 13 Pages 2006
On Validity Assurance of Dynamic Reconfiguration for Component-based Programs Fulltext Access 13 Pages 2006
Formal Verification of the Quasi-Static Behavior of Mixed-Signal Circuits by Property Checking Fulltext Access 13 Pages 2006
The complexity of learning concept classes with polynomial general dimension Fulltext Access 14 Pages 2006
Improving the Quality of Web-based Enterprise Applications with Extended Static Checking: A Case Study Fulltext Access 14 Pages 2006
k-Valued non-associative Lambek grammars are learnable from generalized functor-argument structures Fulltext Access 14 Pages 2006
On the structure of the counting function of sparse context-free languages Fulltext Access 14 Pages 2006
Parity graph-driven read-once branching programs and an exponential lower bound for integer multiplication Fulltext Access 14 Pages 2006
Experiments with deterministic ω-automata for formulas of linear temporal logic Fulltext Access 14 Pages 2006
Information theory in property testing and monotonicity testing in higher dimension Fulltext Access 14 Pages 2006
Incremental construction of minimal deterministic finite cover automata Fulltext Access 14 Pages 2006
Generalized metarationalities in the graph model for conflict resolution Fulltext Access 14 Pages 2006
Model Checking of Component Behavior Specification: A Real Life Experience Fulltext Access 14 Pages 2006
The Axiom System IΣ0 Manages to Simultaneously Obey and Evade the Herbrandized Version of the Second Incompleteness Theorem Fulltext Access 14 Pages 2006
An annotated bibliography of combinatorial optimization problems with fixed cardinality constraints Fulltext Access 14 Pages 2006
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System Fulltext Access 14 Pages 2006
Choiceless Polynomial Time, Counting and the Cai–Fürer–Immerman Graphs: (Extended Abstract) Fulltext Access 14 Pages 2006
Accelerated algorithm for pattern detection in logical analysis of data Fulltext Access 14 Pages 2006
Analyzing LTL Model Checking Techniques for Plan Synthesis and Controller Synthesis (Work in Progress) Fulltext Access 14 Pages 2006
Formal Conformance Testing of Systems with Refused Inputs and Forbidden Actions Fulltext Access 14 Pages 2006