Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 39, Issue 1Jan. 1992
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0004-5411
EISSN:1557-735X
Reflects downloads up to 13 Sep 2024Bibliometrics
Skip Table Of Content Section
article
Free
An optimal algorithm for intersecting line segments in the plane

The main contribution of this work is an O(n log n + k)-time algorithm for computing all k intersections among n line segments in the plane. This time complexity is easily shown to be optimal. Within the same asymptotic cost, our algorithm can also ...

article
Free
An O(log N) deterministic packet-routing scheme

A deterministic O(log N)-time algorithm for the problem of routing an aribitrary permutation on an N-processor bounded-degree network with bounded buffers is presented.

Unlike all previous deterministic solutions to this problem, our routing scheme does ...

article
Free
Syntactical characterization of a subset of domain-independent formulas

A domain-independent formula of first-order predicate calculus is a formula whose evaluation in a given interpretation does not change when we add a new constant to the interpretation domain. The formulas used to express queries, integrity constraints ...

article
Free
Institutions: abstract model theory for specification and programming

There is a population explosion among the logical systems used in computing science. Examples include first-order logic, equational logic, Horn-clause logic, higher-order logic, infinitary logic, dynamic logic, intuitionistic logic, order-sorted logic, ...

article
Free
Termination, deadlock, and divergence

In this paper, a process algebra that incorporates explicit representations of successful termination, deadlock, and divergence is introduced and its semantic theory is analyzed. Both an operational and a denotational semantics for the language is given ...

article
Free
Single-class bounds of multi-class queuing networks

In a closed, separable, queuing network model of a computer system, the number of customer classes is an input parameter. The number of classes and the class compositions are assumptions regarding the characteristics of the system's workload. Often, the ...

article
Free
How to sign given any trapdoor permutation

A digital signature scheme is presented, which is based on the existence of any trapdoor permutation. The scheme is secure in the strongest possible natural sense: namely, it is secure against existential forgery under adaptive chosen message attack.

article
Free
Lower bounds for the low hierarchy

Subjects

Comments