Sciweavers

42 search results - page 7 / 9
» Empty Alternation
Sort
View
CORR
2010
Springer
72views Education» more  CORR 2010»
13 years 7 months ago
Sequential Rationality in Cryptographic Protocols
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationallybounded pl...
Ronen Gradwohl, Noam Livne, Alon Rosen
ICDE
2011
IEEE
232views Database» more  ICDE 2011»
12 years 11 months ago
XClean: Providing valid spelling suggestions for XML keyword queries
—An important facility to aid keyword search on XML data is suggesting alternative queries when user queries contain typographical errors. Query suggestion thus can improve users...
Yifei Lu, Wei Wang, Jianxin Li, Chengfei Liu
NTMS
2009
IEEE
14 years 2 months ago
Performance Study of Node Placement for Congestion Control in Wireless Sensor Networks
— Performance of Wireless Sensor Networks (WSNs) can be affected when the network is deployed under different topologies. In this paper we present a performance study of congesti...
Vasos Vassiliou, Charalambos Sergiou
COR
2002
95views more  COR 2002»
13 years 7 months ago
Dynamic lot sizing and tool management in automated manufacturing systems
The overall aim of this study is to show that there is a critical interface between the lot sizing and tool management decisions, and these two problems cannot be viewed in isolat...
M. Selim Akturk, Siraceddin Onen
TACAS
2012
Springer
275views Algorithms» more  TACAS 2012»
12 years 3 months ago
Pushdown Model Checking for Malware Detection
The number of malware is growing extraordinarily fast. Therefore, it is important to have efficient malware detectors. Malware writers try to obfuscate their code by different tec...
Fu Song, Tayssir Touili