Cargando…

Theoretical Computer Science 6th IFIP WG 2.2 International Conference, TCS 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Calude, Christian S. (Editor ), Sassone, Vladimiro (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:IFIP Advances in Information and Communication Technology, 323
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Convexity, Duality and Effects
  • A Calculus for Power-Aware Multicast Communications in Ad Hoc Networks
  • The Coarsest Precongruences Respecting Safety and Liveness Properties
  • Entropy and Attack Models in Information Flow
  • Safe Equivalences for Security Properties
  • On Probabilistic Alternating Simulations
  • Probabilistic Mobility Models for Mobile and Wireless Networks
  • On Packing Splittable Items with Cardinality Constraints
  • Deterministic Computations in Time-Varying Graphs: Broadcasting under Unstructured Mobility
  • Slicing Behavior Tree Models for Verification
  • Optimization of the Anisotropic Gaussian Kernel for Text Segmentation and Parameter Extraction
  • Online Dictionary Matching for Streams of XML Documents
  • The Duality of Computation under Focus
  • Polarized Resolution Modulo
  • A Logic on Subobjects and Recognizability
  • Terminating Tableaux for with Number Restrictions on Transitive Roles
  • Proof System for Applied Pi Calculus
  • Concurrent Pattern Calculus
  • Initial Segment Complexities of Randomness Notions
  • Topologies Refining the Cantor Topology on X ?
  • On Symbolic Representations of Maximum Matchings and (Un)directed Graphs
  • Traceable Sets
  • Approximating the Non-contiguous Multiple Organization Packing Problem
  • Improving the Competitive Ratios of the Seat Reservation Problem
  • A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis
  • A Game-Theoretic Approach to Routing under Adversarial Conditions
  • An Operational Model for Multiprocessors with Caches.