Fakultät für Informatik
-
Technische Universität München
Lehrstuhl für Effiziente Algorithmen
Die bibliographische Datenbank LEABib
Suchen
•
Liste der Journale
•
Liste der Serien
•
Liste der Konferenzen
•
Ausgewählte Publikationen
Hilfe
Suche: Journal=Inf.~Comput. AND Volume=206
Als [
bib
] [
pdf
] [
ps
] [
dvi
] [
xml
] herunterladen.
Generic density and small span theorem
Philippe Moser
Information and Computation
206
(1), 2008, pp. 1-14
Baire categories on small complexity classes and meager-comeager laws
Philippe Moser
Information and Computation
206
(1), 2008, pp. 15-33
Symmetric electoral systems for ambient calculi
Iain Phillips
,
Maria Grazia Vigliotti
Information and Computation
206
(1), 2008, pp. 34-72
Timed Petri nets and timed automata: On the discriminating power of zeno sequences
Patricia Bouyer
,
Serge Haddad
,
Pierre-Alain Reynier
Information and Computation
206
(1), 2008, pp. 73-107
Universal extensions to simulate specifications
Wim H. Hesselink
Information and Computation
206
(1), 2008, pp. 108-128
Rule-based static analysis of network protocol implementations
Octavian Udrea
,
Cristian Lumezanu
,
Jeffrey S. Foster
Information and Computation
206
(2-4), 2008, pp. 130-157
Execution monitoring enforcement under memory-limitation constraints
Chamseddine Talhi
,
Nadia Tawbi
,
Mourad Debbabi
Information and Computation
206
(2-4), 2008, pp. 158-184
Analysis of dynamic policies
A. Prasad Sistla
,
Min Zhou
Information and Computation
206
(2-4), 2008, pp. 185-212
Preservation of probabilistic information flow under refinement
Thomas Santen
Information and Computation
206
(2-4), 2008, pp. 213-249
Authenticating ad hoc networks by comparison of short digests
L.H. Nguyen
,
A.W. Roscoe
Information and Computation
206
(2-4), 2008, pp. 250-271
Fair multi-party contract signing using private contract signatures
Aybek Mukhamedov
,
Mark D. Ryan
Information and Computation
206
(2-4), 2008, pp. 272-290
On the relationships between models in protocol verification
Sebastian Mödersheim
Information and Computation
206
(2-4), 2008, pp. 291-311
Symbolic protocol analysis for monoidal equational theories
Stéphanie Delaune
,
Pascal Lafourcade
,
Denis Lugiez
,
Ralf Treinen
Information and Computation
206
(2-4), 2008, pp. 312-351
Hierarchical combination of intruder theories
Yannick Chevalier
,
Michael Rusinowitch
Information and Computation
206
(2-4), 2008, pp. 352-377
Anonymity protocols as noisy channels
Konstantinos Chatzikokolakis
,
Catuscia Palamidessi
,
Prakash Panangaden
Information and Computation
206
(2-4), 2008, pp. 378-401
Breaking and fixing public-key Kerberos
Iliano Cervesato
,
Aaron D. Jaggard
,
Andre Scedrov
,
Joe-Kai Tsay
,
Christopher Walstad
Information and Computation
206
(2-4), 2008, pp. 402-424
A framework for compositional verification of security protocols
Suzana Andova
,
Cas Cremers
,
Kristian Gjsteen
,
Sjouke Mauw
,
Stig F. Mjlsnes
,
Sas̑a Radomirović
Information and Computation
206
(2-4), 2008, pp. 425-459
Information flow security in boundary ambients
Chiara Braghin
,
Agostino Cortesi
,
Riccardo Focardi
Information and Computation
206
(2-4), 2008, pp. 460-489
On finite alphabets and infinite bases
Taolue Chen
,
Wan Fokkink
,
Bas Luttik
,
Sumit Nain
Information and Computation
206
(5), 2008, pp. 492-519
Reachability in recursive Markov decision processes
Tomás̑ Brázdil
,
Václav Broz̑ek
,
Vojtȇch Forejt
,
Antonín Kuc̑era
Information and Computation
206
(5), 2008, pp. 520-537
The Boolean hierarchy of
NP
-partitions
Sven Kosub
,
Klaus W. Wagner
Information and Computation
206
(5), 2008, pp. 538-568
Trees with exponentially growing costs
Frank Schulz
Information and Computation
206
(5), 2008, pp. 569-578
Deciding expressive description logics in the framework of resolution
Ullrich Hustadt
,
Boris Motik
,
Ulrike Sattler
Information and Computation
206
(5), 2008, pp. 579-601
Preemptive scheduling on a small number of hierarchical machines
György Dósa
,
Leah Epstein
Information and Computation
206
(5), 2008, pp. 602-619
Generalizing the Paige-Tarjan algorithm by abstract interpretation
Francesco Ranzato
,
Francesco Tapparo
Information and Computation
206
(5), 2008, pp. 620-651
Seiten 1
2
3
4
>