Model-checking process equivalences (Englisch)

In: THEORETICAL COMPUTER SCIENCE - AMSTERDAM-   ;  560 ;  326-347  ;  2014
  • ISSN:
  • Aufsatz (Zeitschrift)  /  Print

Wie erhalte ich diesen Titel?

Inhaltsverzeichnis – Band 560

Zeige alle Jahrgänge und Ausgaben

Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.

1
Preface
Mor, Tal / Renner, Renato | 2014
7
Quantum cryptography: Public key distribution and coin tossing
Bennett, Charles H. / Brassard, Gilles | 2014
12
Secure identification and QKD in the bounded-quantum-storage model
Damgård, Ivan / Fehr, Serge / Salvail, Louis / Schaffner, Christian | 2014
27
The black paper of quantum cryptography: Real implementation problems
Scarani, Valerio / Kurtsiefer, Christian | 2011
33
Public-key cryptography based on bounded quantum reference frames
Ioannou, Lawrence M. / Mosca, Michele | 2011
46
Quantum key distribution using a two-way quantum channel
Lucamarini, Marco / Mancini, Stefano | 2011
62
Using quantum key distribution for cryptographic purposes: A survey
Alléaume, R. / Branciard, C. / Bouda, J. / Debuisschert, T. / Dianati, M. / Gisin, N. / Godfrey, M. / Grangier, P. / Länger, T. / Lütkenhaus, N. et al. | 2013
82
Non-contextual chocolate balls versus value indefinite quantum cryptography
Svozil, Karl | 2014
91
Optimal axis compensation in quantum key distribution protocols over unital channels
Watanabe, Shun / Matsumoto, Ryutaroh / Uyematsu, Tomohiko | 2013
107
Theory and Applications of Models of Computation at the Turing Centenary in China
Barmpalias, George / Agrawal, Manindra / Cooper, S. Barry | 2014
108
The worst case behavior of randomized gossip protocols
Baumann, Hervé / Fraigniaud, Pierre / Harutyunyan, Hovhannes A. / de Verclos, Rémi | 2014
121
Lower bounds of shortest vector lengths in random NTRU lattices
Bi, Jingguo / Cheng, Qi | 2014
131
Implicit computation of maximum bipartite matchings by sublinear functional operations
Bollig, Beate / Gillé, Marc / Pröger, Tobias | 2014
147
Approximating MAX SAT by moderately exponential and parameterized algorithms
Escoffier, Bruno / Paschos, Vangelis Th. / Tourniaire, Emeric | 2014
158
Improved parameterized algorithms for minimum link-length rectilinear spanning path problem
Feng, Qilong / Wang, Jianxin / Xu, Chao / Yao, Jinyi / Chen, Jianer | 2014
172
Timed encryption with application to deniable key exchange
Jiang, Shaoquan | 2014
190
Online optimization of busy time on parallel machines
Shalom, Mordechai / Voloshin, Ariella / Wong, Prudence W.H. / Yung, Fencol C.C. / Zaks, Shmuel | 2014
207
A refined exact algorithm for Edge Dominating Set
Xiao, Mingyu / Nagamochi, Hiroshi | 2014
217
Preface to the special issue on GandALF 2012
Faella, Marco / Murano, Aniello | 2014
219
Down the Borel hierarchy: Solving Muller games via safety games
Neider, Daniel / Rabinovich, Roman / Zimmermann, Martin | 2014
235
The discrete strategy improvement algorithm for parity games and complexity measures for directed graphs
Canavoi, Felix / Grädel, Erich / Rabinovich, Roman | 2014
251
Validating XML document adaptations via Hedge Automata transformations
Solimando, Alessandro / Delzanno, Giorgio / Guerrini, Giovanna | 2014
269
Interval temporal logics over strongly discrete linear orders: Expressiveness and complexity
Bresolin, Davide / Della Monica, Dario / Montanari, Angelo / Sala, Pietro / Sciavicco, Guido | 2014
292
The μ-calculus alternation hierarchy collapses over structures with restricted connectivity
Gutierrez, Julian / Klaedtke, Felix / Lange, Martin | 2014
307
A decidable two-sorted quantified fragment of set theory with ordered pairs and some undecidable extensions
Cantone, Domenico / Longo, Cristiano | 2014
326
Model-checking process equivalences
Lange, Martin / Lozes, Etienne / Vargas Guzmán, Manuel | 2014
348
Interface simulation distances
Černý, Pavol / Chmelík, Martin / Henzinger, Thomas A. / Radhakrishna, Arjun | 2014
364
Program verification using symbolic game semantics
Dimovski, Aleksandar S. | 2014
iii
Editorial Board
| 2014