Trust Evolution Policies for Security in Collaborative Ad Hoc Applications Fulltext Access 17 Pages 2006
A tight bound on remote reference time complexity of mutual exclusion in the read-modify-write model Fulltext Access 17 Pages 2006
Parallel sparse LU factorization on different message passing platforms Fulltext Access 17 Pages 2006
Inoculation strategies for victims of viruses and the sum-of-squares partition problem Fulltext Access 17 Pages 2006
Examination of load-balancing methods to improve efficiency of a composite materials manufacturing process simulation under uncertainty using distributed computing Fulltext Access 17 Pages 2006
Concurrent LSC Verification: On Decomposition Properties of Partially Ordered Symbolic Automata Fulltext Access 17 Pages 2006
Verification of AMBA Using a Combination of Model Checking and Theorem Proving Fulltext Access 17 Pages 2006
Quantifier Elimination over Algebraically Closed Fields in a Proof Assistant using a Computer Algebra System Fulltext Access 17 Pages 2006
Syntax-driven Behavior Partitioning for Model-checking of Esterel Programs Fulltext Access 17 Pages 2006
Design Challenges for a Differential-Power-Analysis Aware GALS-based AES Crypto ASIC Fulltext Access 17 Pages 2006
Filling Out the Gaps: A Padding Algorithm for Transforming Out Timing Leaks Fulltext Access 17 Pages 2006
A Classification of Time and/or Probability Dependent Security Properties Fulltext Access 17 Pages 2006
Formal design and verification of operational transformation algorithms for copies convergence Fulltext Access 17 Pages 2006
Analysis of a Multiobjective Evolutionary Algorithm on the 0–1 knapsack problem Fulltext Access 17 Pages 2006
Computing phylogenetic roots with bounded degrees and errors is NP-complete Fulltext Access 17 Pages 2006
Distributed mutual exclusion algorithms for grid applications: A hierarchical approach Fulltext Access 17 Pages 2006
AspectLISA: An Aspect-oriented Compiler Construction System Based on Attribute Grammars Fulltext Access 17 Pages 2006
Conditional Doxastic Models: A Qualitative Approach to Dynamic Belief Revision Fulltext Access 17 Pages 2006
Power and Type I error rates of goodness-of-fit statistics for binomial generalized estimating equations (GEE) models Fulltext Access 17 Pages 2006
Confidence intervals for a binomial parameter based on binary data subject to false-positive misclassification Fulltext Access 17 Pages 2006
A studentized range test for the equivalency of normal means under heteroscedasticity Fulltext Access 17 Pages 2006
Interval estimation in a finite mixture model: Modeling PP-values in multiple testing applications Fulltext Access 17 Pages 2006
Segmenting magnetic resonance images via hierarchical mixture modelling Fulltext Access 17 Pages 2006
Broadcasting and querying multi-dimensional index trees in a multi-channel environment Fulltext Access 17 Pages 2006
Domain Theoretic Solutions of Initial Value Problems for Unbounded Vector Fields Fulltext Access 17 Pages 2006
Adherence clustering: an efficient method for mining market-basket clusters Fulltext Access 17 Pages 2006
Efficient Patterns for Model Checking Partial State Spaces in CTL ∩ LTL Fulltext Access 17 Pages 2006
Language-Emptiness Checking of Alternating Tree Automata Using Symbolic Reachability Analysis Fulltext Access 17 Pages 2006
Applying a Model Transformation Taxonomy to Graph Transformation Technology Fulltext Access 17 Pages 2006
Reasoning About Connector Reconfiguration II: Basic Reconfiguration Logic Fulltext Access 17 Pages 2006