Sciweavers

186 search results - page 17 / 38
» Deriving Mixed Evaluation from Standard Evaluation for a Sim...
Sort
View
POPL
2010
ACM
14 years 4 months ago
A Relational Modal Logic for Higher-Order Stateful ADTs
The method of logical relations is a classic technique for proving the equivalence of higher-order programs that implement the same observable behavior but employ different intern...
Derek Dreyer, Georg Neis, Andreas Rossberg, Lars B...
ICDE
2009
IEEE
157views Database» more  ICDE 2009»
13 years 5 months ago
Query Rewrites with Views for XML in DB2
There is much effort to develop comprehensive support for the storage and querying of XML data in database management systems. The major developers have extended their systems to h...
Parke Godfrey, Jarek Gryz, Andrzej Hoppe, Wenbin M...
ICC
2009
IEEE
139views Communications» more  ICC 2009»
13 years 5 months ago
Non Disruptive Data Services Towards Real-Time Traffic in Wireless Ad Hoc Networks
Abstract--Mobile wireless Ad hoc NETworks (MANETs) naturally support a traffic mix of elastic and real-time flows but the shared nature and lossy properties of the radio medium mak...
Jeremie Leguay, Hicham Khalife, Georgios Sotiropou...
TREC
2008
13 years 8 months ago
FEUP at TREC 2008 Blog Track: Using Temporal Evidence for Ranking and Feed Distillation
This paper presents the participation of FEUP, from University of Porto, in the TREC 2008 Blog Track. FEUP participated in two tasks, the baseline adhoc retrieval task and the blo...
Sérgio Nunes, Cristina Ribeiro, Gabriel Dav...
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
14 years 8 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...