Sciweavers

798 search results - page 108 / 160
» Comparing the expressive power of access control models
Sort
View
ENTCS
2007
168views more  ENTCS 2007»
13 years 10 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
WCNC
2008
IEEE
14 years 4 months ago
Analysis of Distributed Reservation Protocol for UWB-Based WPANs with ECMA-368 MAC
— The recent ECMA-368 standard specifies the use of ultra wideband (UWB) technology for high rate communications in wireless personal area networks (WPANs). This paper proposes ...
Nasim Arianpoo, Yuxia Lin, Vincent W. S. Wong, Att...
ICC
2008
IEEE
100views Communications» more  ICC 2008»
14 years 4 months ago
Discrete-Time Frequency-Selective Rayleigh Fading Channel --- Impact of Correlated Scattering on Outage and Ergodic Capacity
Abstract— We consider a discrete-time frequencyselective block-fading channel with Rayleigh fading and correlated scattering. This is relevant in the area of UWB and if transceiv...
Christian Müller, Martin Mittelbach
WISE
2005
Springer
14 years 3 months ago
Asynchronous Web Services Communication Patterns in Business Protocols
Asynchronous interactions are becoming more and more important in the realization of complex B2B Web applications, and Web services are at the moment the most innovative and well-e...
Marco Brambilla, Giuseppe Guglielmetti, Christina ...
CL
2000
Springer
13 years 10 months ago
Associative definition of programming languages
Associative Language Descriptions are a recent grammar model, theoretically less powerful than Context Free grammars, but adequate for describing the syntax of programming languag...
Stefano Crespi-Reghizzi, Matteo Pradella, Pierluig...