Sciweavers

213 search results - page 38 / 43
» A framework for checking proofs naturally
Sort
View
DSN
2005
IEEE
14 years 1 months ago
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where loca...
Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K...
ICNP
2005
IEEE
14 years 1 months ago
Typed Abstraction of Complex Network Compositions
straction of Complex Network Compositions∗ Azer Bestavros, Adam D. Bradley, Assaf J. Kfoury, and Ibrahim Matta Department of Computer Science Boston University The heterogeneity...
Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibr...
ICSOC
2005
Springer
14 years 1 months ago
Pattern-Based Specification and Validation of Web Services Interaction Properties
There have been significant efforts in providing semantic descriptions for Web services, including the approach as exemplified by OWLS. Part of the semantic description in OWL-S is...
Zheng Li, Jun Han, Yan Jin
EMSOFT
2008
Springer
13 years 9 months ago
Interface theories with component reuse
Interface theories have been proposed to support incremental design and independent implementability. Incremental design means that the compatibility checking of interfaces can pr...
Laurent Doyen, Thomas A. Henzinger, Barbara Jobstm...
LREC
2008
114views Education» more  LREC 2008»
13 years 9 months ago
UFRA: a UIMA-based Approach to Federated Language Resource Architecture
In this paper we address the issue of developing an interoperable infrastructure for language resources and technologies. In our approach, called UFRA, we extend the Federate Data...
Riccardo Del Gratta, Roberto Bartolini, Tommaso Ca...