Sciweavers

1021 search results - page 64 / 205
» Pure Subtype Systems
Sort
View
ETRICS
2006
13 years 11 months ago
A P2P Content Authentication Protocol Based on Byzantine Agreement
One of the main advantages of peer-to-peer (P2P) systems is their capability to offer replicas of the same content at various locations. This allows to access contents even when so...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 8 months ago
Decision Problems for Petri Nets with Names
We prove several decidability and undecidability results for -PN, an extension of P/T nets with pure name creation and name management. We give a simple proof of undecidability of...
Fernando Rosa Velardo, David de Frutos-Escrig
TMC
2008
164views more  TMC 2008»
13 years 7 months ago
Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks
Integrating mobile computing and localized user interaction into the Internet requires more than simply overcoming pure routing challenges. Apart from issues such as intermittent c...
Anargyros Garyfalos, Kevin C. Almeroth
POPL
2008
ACM
14 years 8 months ago
The design and implementation of typed scheme
When scripts in untyped languages grow into large programs, maintaining them becomes difficult. A lack of types in typical scripting languages means that programmers must (re)disc...
Sam Tobin-Hochstadt, Matthias Felleisen
ICNC
2005
Springer
14 years 1 months ago
Visual Search for Object Features
In this work we present the computational algorithm that combines perceptual and cognitive information during the visual search for object features. The algorithm is initially driv...
Predrag Neskovic, Leon N. Cooper