What Level of Mathematical Reasoning can Computer Science Demand of a Software Implementer? Fulltext Access 28 Pages 2005
Encapsulation and behavioral inheritance in a synchronous model of computation for embedded system services adaptation Fulltext Access 29 Pages 2005
A common algebraic description for probabilistic and quantum computations Fulltext Access 29 Pages 2005
Asynchronous aggregation and consistency in distributed constraint satisfaction Fulltext Access 29 Pages 2005
A novel giant-subgraph phase-transition in sparse random k-partite graphs Fulltext Access 29 Pages 2005
Monotone runs of uniformly distributed integer random variables: A probabilistic analysis Fulltext Access 30 Pages 2005
A comprehensive framework for modeling set-based business rules during conceptual database design Fulltext Access 30 Pages 2005
Specification and validation of process constraints for flexible workflows Fulltext Access 30 Pages 2005
Linear-time algorithms for the Hamiltonian problems on distance-hereditary graphs Fulltext Access 30 Pages 2005
On the one-sided crossing minimization in a bipartite graph with large degrees Fulltext Access 30 Pages 2005
Computing the solution of the Korteweg-de Vries equation with arbitrary precision on Turing machines Fulltext Access 30 Pages 2005
Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols Fulltext Access 30 Pages 2005
Performing work with asynchronous processors: Message-delay-sensitive bounds Fulltext Access 30 Pages 2005
Expansion: the Crucial Mechanism for Type Inference with Intersection Types: A Survey and Explanation Fulltext Access 30 Pages 2005
Learning to talk about events from narrated video in a construction grammar framework Fulltext Access 31 Pages 2005
Simple and optimal output-sensitive construction of contour trees using monotone paths Fulltext Access 31 Pages 2005
De Bruijn's syntax and reductional behaviour of λ-terms: the typed case Fulltext Access 31 Pages 2005
Sensor networks and distributed CSP: communication, computation and complexity Fulltext Access 31 Pages 2005
Translation of resolution proofs into short first-order proofs without choice axioms Fulltext Access 31 Pages 2005
Verifying security protocols with PVS: widening the rank function approach Fulltext Access 32 Pages 2005
Unifying simulatability definitions in cryptographic systems under different timing assumptions Fulltext Access 32 Pages 2005
Adopt: asynchronous distributed constraint optimization with quality guarantees Fulltext Access 32 Pages 2005
Issues in the Analysis of Proof-Search Strategies in Sequential Presentations of Logics Fulltext Access 33 Pages 2005
Automatic cinematography and multilingual NLG for generating video documentaries Fulltext Access 33 Pages 2005
Results on multiples of primitive polynomials and their products over GF(2) Fulltext Access 33 Pages 2005
Distributed stochastic search and distributed breakout: properties, comparison and applications to constraint optimization problems in sensor networks Fulltext Access 33 Pages 2005
Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically Fulltext Access 33 Pages 2005