Sciweavers

2372 search results - page 384 / 475
» Probabilistic calling context
Sort
View
DKE
2006
110views more  DKE 2006»
13 years 8 months ago
Efficient recursive XML query processing using relational database systems
Recursive queries are quite important in the context of XML databases. In addition, several recent papers have investigated a relational approach to store XML data and there is gr...
Sandeep Prakash, Sourav S. Bhowmick, Sanjay Kumar ...
ENTCS
2006
173views more  ENTCS 2006»
13 years 8 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
ENTCS
2006
144views more  ENTCS 2006»
13 years 8 months ago
Infinitary Howe's Method
Howe's method is a well-known technique for proving that various kinds of applicative bisimilarity (or similarity) on a functional language are congruences (or precongruences...
Paul Blain Levy
ETS
2006
IEEE
119views Hardware» more  ETS 2006»
13 years 8 months ago
An Ontology-Based Framework for Bridging Learning Design and Learning Content
The paper describes an ontology-based framework for bridging learning design and learning object content. In present solutions, researchers have proposed conceptual models and dev...
Colin Knight, Dragan Gasevic, Griff Richards
INFSOF
2008
121views more  INFSOF 2008»
13 years 8 months ago
A test driven approach for aspectualizing legacy software using mock systems
Aspect-based refactoring, called aspectualization, involves moving program code that implements cross-cutting concerns into aspects. Such refactoring can improve the maintainabili...
Michael Mortensen, Sudipto Ghosh, James M. Bieman