Sciweavers

872 search results - page 76 / 175
» An Access Control Language for a General Provenance Model
Sort
View
ICLP
2005
Springer
14 years 1 months ago
Modeling Systems in CLP
We present a methodology for the modeling of complex program behavior in CLP. In the first part we present an informal description about how to represent a system in CLP. At its ...
Joxan Jaffar, Andrew E. Santosa, Razvan Voicu
POPL
2012
ACM
12 years 3 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
SIGCOMM
2009
ACM
14 years 2 months ago
In defense of wireless carrier sense
Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. Carrier sense is known ...
Micah Z. Brodsky, Robert T. Morris
NETWORKING
2007
13 years 9 months ago
Performance and Equilibrium Analysis of Heterogeneous IEEE 802.11 Based WLANs
This paper presents a general model to study the medium access control (MAC) layer performance and equilibrium of WLANs consisting of nodes with different MAC parameters (e.g., ba...
Hao Zhu
CORR
2011
Springer
235views Education» more  CORR 2011»
13 years 2 months ago
On the accuracy of language trees
Historical linguistics aims at inferring the most likely language phylogenetic tree starting from information concerning the evolutionary relatedness of languages. The available i...
Simone Pompei, Vittorio Loreto, Francesca Tria