Sciweavers

168 search results - page 32 / 34
» Efficiently Detecting Inclusion Dependencies
Sort
View
ICLP
2009
Springer
14 years 8 months ago
Incremental Answer Completion in the SLG-WAM
The SLG-WAM of XSB Prolog soundly implements the Well-Founded Semantics (WFS) for logic programs, but in a few pathological cases its engine treats atoms as undefined that are true...
Alexandre Miguel Pinto, Luís Moniz Pereira,...
ICFP
2001
ACM
14 years 7 months ago
Functioning without Closure: Type-Safe Customized Function Representations for Standard ML
The CIL compiler for core Standard ML compiles whole ML programs using a novel typed intermediate language that supports the generation of type-safe customized data representation...
Allyn Dimock, Ian Westmacott, Robert Muller, Frank...
AINA
2007
IEEE
14 years 1 months ago
Trust Enhanced Secure Mobile Ad-Hoc Network Routing
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
Venkatesan Balakrishnan, Vijay Varadharajan, Phill...
ICPP
2006
IEEE
14 years 1 months ago
Improving Spatial Reuse with Collision-Aware DCF in Mobile Ad Hoc Networks
—Carrier sensing is a medium access method widely adopted in wireless communication to protect data transfers from interference. For example, Distributed Coordination Function (D...
Lubo Song, Chansu Yu
WS
2003
ACM
14 years 17 days ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas