Sciweavers

625 search results - page 120 / 125
» On the direct limit of a direct system of multialgebras
Sort
View
VMCAI
2004
Springer
14 years 1 months ago
Construction of a Semantic Model for a Typed Assembly Language
Typed Assembly Languages (TALs) can be used to validate the safety of assembly-language programs. However, typing rules are usually trusted as axioms. In this paper, we show how to...
Gang Tan, Andrew W. Appel, Kedar N. Swadi, Dinghao...
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
14 years 1 months ago
Learning Through Telemedicine Networks
Telemedicine is advocated for its potential to improve the accessibility and quality of health care delivery while lowering costs [1]. Although the potential benefits of telemedic...
Liqiong Deng, Marshall Scott Poole
HICSS
2003
IEEE
143views Biometrics» more  HICSS 2003»
14 years 1 months ago
Formation, Routing, and Maintenance Protocols for the BlueRing Scatternet of Bluetooths
The basic networking unit in Bluetooth is piconet, and a larger-area Bluetooth network can be formed by multiple piconets, called scatternet. However, the structure of scatternets...
Ting-Yu Lin, Yu-Chee Tseng, Keng-Ming Chang, Chun-...
P2P
2003
IEEE
205views Communications» more  P2P 2003»
14 years 1 months ago
Peer-to-Peer Spatial Queries in Sensor Networks
Sensor networks, that consist of potentially several thousands of nodes each with sensing (heat, sound, light, magnetism, etc.) and wireless communication capabilities, provide gr...
Murat Demirbas, Hakan Ferhatosmanoglu
WPES
2003
ACM
14 years 1 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett