Sciweavers

2573 search results - page 470 / 515
» Combinations of Modal Logics
Sort
View
129
Voted
CORR
2006
Springer
71views Education» more  CORR 2006»
15 years 4 months ago
Wreath Products in Stream Cipher Design
The paper develops a novel approach to stream cipher design: Both the state update function and the output function of the corresponding pseudorandom generators are compositions of...
Vladimir Anashin
IJSNET
2008
118views more  IJSNET 2008»
15 years 4 months ago
A fuzzy-based virtual backbone routing for large-scale MANETs
: Virtual backbone-based routing is a promising approach for enhancing the routing efficiency in MANETs. To establish communication in the network, the virtual backbone nodes have ...
Wassim El-Hajj, Dionysios Kountanis, Ala I. Al-Fuq...
IJWIS
2008
107views more  IJWIS 2008»
15 years 4 months ago
Adaptive ontology re-use: finding and re-using sub-ontologies
Purpose The discovery of the "right" ontology or ontology part is a central ingredient for effective ontology re-use. We present an approach for supporting a form of ada...
Rodolfo Stecher, Claudia Niederée, Wolfgang...
JFP
2008
135views more  JFP 2008»
15 years 4 months ago
Hoare type theory, polymorphism and separation
We consider the problem of reconciling a dependently typed functional language with imperative features such as mutable higher-order state, pointer aliasing, and non-termination. ...
Aleksandar Nanevski, J. Gregory Morrisett, Lars Bi...
JLP
2008
134views more  JLP 2008»
15 years 4 months ago
Backwards type analysis of asynchronous method calls
Asynchronous method calls have been proposed to better integrate object orientation with distribution. In the Creol language, asynchronous method calls are combined with so-called...
Einar Broch Johnsen, Ingrid Chieh Yu