Theoretical Computer Science 6th IFIP TC 1/WG 2.2 International Conference, TCS 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Calude, Cristian S. (Επιμελητής έκδοσης), Sassone, Vladimiro (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:IFIP Advances in Information and Communication Technology, 323
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Convexity, Duality and Effects
  • A Calculus for Power-Aware Multicast Communications in Ad Hoc Networks
  • The Coarsest Precongruences Respecting Safety and Liveness Properties
  • Entropy and Attack Models in Information Flow
  • Safe Equivalences for Security Properties
  • On Probabilistic Alternating Simulations
  • Probabilistic Mobility Models for Mobile and Wireless Networks
  • On Packing Splittable Items with Cardinality Constraints
  • Deterministic Computations in Time-Varying Graphs: Broadcasting under Unstructured Mobility
  • Slicing Behavior Tree Models for Verification
  • Optimization of the Anisotropic Gaussian Kernel for Text Segmentation and Parameter Extraction
  • Online Dictionary Matching for Streams of XML Documents
  • The Duality of Computation under Focus
  • Polarized Resolution Modulo
  • A Logic on Subobjects and Recognizability
  • Terminating Tableaux for with Number Restrictions on Transitive Roles
  • Proof System for Applied Pi Calculus
  • Concurrent Pattern Calculus
  • Initial Segment Complexities of Randomness Notions
  • Topologies Refining the Cantor Topology on X ?
  • On Symbolic Representations of Maximum Matchings and (Un)directed Graphs
  • Traceable Sets
  • Approximating the Non-contiguous Multiple Organization Packing Problem
  • Improving the Competitive Ratios of the Seat Reservation Problem
  • A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis
  • A Game-Theoretic Approach to Routing under Adversarial Conditions
  • An Operational Model for Multiprocessors with Caches.