Online Library TheLib.net » Theoretical Computer Science: 6th IFIP TC 1/WG 2.2 International Conference, TCS 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings
cover of the book Theoretical Computer Science: 6th IFIP TC 1/WG 2.2 International Conference, TCS 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

Ebook: Theoretical Computer Science: 6th IFIP TC 1/WG 2.2 International Conference, TCS 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

00
27.01.2024
0
0
This book constitutes the refereed proceedings of the 6th FIP WG 2.2 International Conference, TCS 2010, held as a part of the 21th World Computer Congress, WCC 2010, in Brisbane, Australia, in September 2010. The 23 revised full papers presented, together with 4 invited talks, were carefully reviewed and selected from 39 submissions. TCS 2010 deals with topics focused at but not limited to algorithms, complexity, models of computation, logic, semantics, specification and verification, power-awareness issues in wireless networks, data mining, knowledge discovery, multiprocessor issues as well as AI issues.


This book constitutes the refereed proceedings of the 6th FIP WG 2.2 International Conference, TCS 2010, held as a part of the 21th World Computer Congress, WCC 2010, in Brisbane, Australia, in September 2010. The 23 revised full papers presented, together with 4 invited talks, were carefully reviewed and selected from 39 submissions. TCS 2010 deals with topics focused at but not limited to algorithms, complexity, models of computation, logic, semantics, specification and verification, power-awareness issues in wireless networks, data mining, knowledge discovery, multiprocessor issues as well as AI issues.
Content:
Front Matter....Pages -
Convexity, Duality and Effects....Pages 1-19
A Calculus for Power-Aware Multicast Communications in Ad Hoc Networks....Pages 20-31
The Coarsest Precongruences Respecting Safety and Liveness Properties....Pages 32-52
Entropy and Attack Models in Information Flow....Pages 53-54
Safe Equivalences for Security Properties....Pages 55-70
On Probabilistic Alternating Simulations....Pages 71-85
Probabilistic Mobility Models for Mobile and Wireless Networks....Pages 86-100
On Packing Splittable Items with Cardinality Constraints....Pages 101-110
Deterministic Computations in Time-Varying Graphs: Broadcasting under Unstructured Mobility....Pages 111-124
Slicing Behavior Tree Models for Verification....Pages 125-139
Optimization of the Anisotropic Gaussian Kernel for Text Segmentation and Parameter Extraction....Pages 140-152
Online Dictionary Matching for Streams of XML Documents....Pages 153-164
The Duality of Computation under Focus....Pages 165-181
Polarized Resolution Modulo....Pages 182-196
A Logic on Subobjects and Recognizability....Pages 197-212
Proof System for Applied Pi Calculus....Pages 213-228
Concurrent Pattern Calculus....Pages 229-243
Initial Segment Complexities of Randomness Notions....Pages 244-258
On Symbolic Representations of Maximum Matchings and (Un)directed Graphs....Pages 259-270
Traceable Sets....Pages 271-285
Approximating the Non-contiguous Multiple Organization Packing Problem....Pages 286-300
Improving the Competitive Ratios of the Seat Reservation Problem....Pages 301-315
A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis....Pages 316-327
A Game-Theoretic Approach to Routing under Adversarial Conditions ....Pages 328-339
An Operational Model for Multiprocessors with Caches....Pages 340-354
Back Matter....Pages 355-370
....Pages 371-385
Download the book Theoretical Computer Science: 6th IFIP TC 1/WG 2.2 International Conference, TCS 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen