Theoretical Computer Science: 6th IFIP WG 2.2 International Conference, TCS 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings / Edition 1

Theoretical Computer Science: 6th IFIP WG 2.2 International Conference, TCS 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings / Edition 1

by Christian S. Calude
     
 

ISBN-10: 3642152392

ISBN-13: 9783642152399

Pub. Date: 09/27/2010

Publisher: Springer Berlin Heidelberg

This book constitutes the refereed proceedings of the 6th FIP WG 2.2 International Conference, TCS 2010, held as a part of the 21th World Computer Congress, WCC 2010, in Brisbane, Australia, in September 2010.
The 23 revised full papers presented, together with 4 invited talks, were carefully reviewed and selected from 39 submissions. TCS 2010 deals with topics

Overview

This book constitutes the refereed proceedings of the 6th FIP WG 2.2 International Conference, TCS 2010, held as a part of the 21th World Computer Congress, WCC 2010, in Brisbane, Australia, in September 2010.
The 23 revised full papers presented, together with 4 invited talks, were carefully reviewed and selected from 39 submissions. TCS 2010 deals with topics focused at but not limited to algorithms, complexity, models of computation, logic, semantics, specification and verification, power-awareness issues in wireless networks, data mining, knowledge discovery, multiprocessor issues as well as AI issues.

Product Details

ISBN-13:
9783642152399
Publisher:
Springer Berlin Heidelberg
Publication date:
09/27/2010
Series:
IFIP Advances in Information and Communication Technology Series, #323
Edition description:
2010
Pages:
388
Product dimensions:
6.20(w) x 9.40(h) x 1.00(d)

Table of Contents

Convexity, Duality and Effects (Invited Talk) Bart Jacobs 1

A Calculus for Power-Aware Multicast Communications in Ad Hoc Networks (Invited Talk) Lucia Gallina Sabina Rossi 20

The Coarsest Precongruences Respecting Safety and Liveness Properties (Invited Talk) Robert Jan van Glabbeek 32

Entropy and Attack Models in Information Flow (Invited Talk) Mário S. Alvim Miguel E. Andrés Catuscia Palamidessi 53

Safe Equivalences for Security Properties Mário S. Alvim Miguel E. Andrés Catuscia Palamidessi Peter van Rossum 55

On Probabilistic Alternating Simulations Chenyi Zhang Jun Pang 71

Probabilistic Mobility Models for Mobile and Wireless Networks Lei Song Jens Chr. Godskesen 86

On Packing Splittable Items with Cardinality Constraints Fouad B. Chedid 101

Deterministic Computations in Time-Varying Graphs: Broadcasting under Unstructured Mobility Arnaud Casteigts Paola Flocchini Bernard Mans Nicola Santoro 111

Slicing Behavior Tree Models for Verification Nisansala Yatapanage Kirsten Winter Saad Zafar 125

Optimization of the Anisotropic Gaussian Kernel for Text Segmentation and Parameter Extraction Darko Brodic 140

Online Dictionary Matching for Streams of XML Documents Panu Silvasti Seppo Sippu Eljas Soisalon-Soininen 153

The Duality of Computation under Focus Pierre-Louis Curien Guillaume Munch-Maccagnoni 165

Polarized Resolution Modulo Gilles Dowek 182

A Logic on Subobjects and Recognizability H.J. Sander Bruggink Barbara Krönig 197

Terminating Tableaux for SOQ with Number Restrictions on Transitive Roles Mark Kaminski Gert Smolka 213

Proof System for Applied Pi Calculus Jia Liu Huimin Lin 229

Concurrent Pattern Calculus Thomas Given-Wilson Daniele Gorla Barry Jay 244

Initial Segment Complexities of Randomness Notions Rupert Hölzl Thorsten Kräling Frank Stephan Guohua Wu 259

Topologies Refining the Cantor Topology on Xω Sibylle Schwarz Ludwig Staiger 271

On Symbolic Representations of Maximum Matchings and (Un) directed Graphs Beate Bollig 286

Traceable Sets Rupert Hölzl Wolfgang Merkle 301

Approximating the Non-contiguous Multiple Organization Packing Problem Marin Bougeret Pierre Francois Dutot Klaus Jansen Christina Otte Denis Trystram 316

Improving the Competitive Ratios of the Seat Reservation Problem Shuichi Miyazaki Kazuya Okamoto 328

A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis Michele Boreale David Clark Daniele Gorla 340

A Game-Theoretic Approach to Routing under Adversarial Conditions James Gross Frank G. Radmacher Wolfgang Thomas 355

An Operational Model for Multiprocessors with Caches Salil Joshi Sanjiva Prasad 371

Author Index 387

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >