Sciweavers

1448 search results - page 69 / 290
» Restricted Stack Implementations
Sort
View
ER
2008
Springer
128views Database» more  ER 2008»
13 years 9 months ago
Temporal Constraints in Non-temporal Data Modelling Languages
It is common to find that the definition or common usage of a data modelling language causes there to be restrictions placed on the evolution of data values that are associated wit...
Peter McBrien
CORR
1998
Springer
107views Education» more  CORR 1998»
13 years 7 months ago
Computing Declarative Prosodic Morphology
This paper describes a computational, declarative approach to prosodic morphology that uses inviolable constraints to denote small finite candidate sets which are filtered by a re...
Markus Walther
CASCON
2006
149views Education» more  CASCON 2006»
13 years 9 months ago
Packet decoding using context sensitive parsing
Protocol tester is a project at RMC and Queen's that applies program transformation techniques to protocol data to evaluate the security of network applications. As part of t...
Sylvain Marquis, Thomas R. Dean, Scott Knight
PAM
2010
Springer
14 years 2 months ago
Web Timeouts and Their Implications
Abstract. Timeouts play a fundamental role in network protocols, controlling numerous aspects of host behavior at different layers of the protocol stack. Previous work has documen...
Zakaria Al-Qudah, Michael Rabinovich, Mark Allman
ETFA
2008
IEEE
14 years 2 months ago
Framework for real-time analysis in Rubus-ICE
In this paper, we present the development of a plug-in framework for integration of real-time analysis methods in the Rubus Integrated Component Environment (RubusICE). We also pr...
Kaj Hänninen, Jukka Mäki-Turja, Staffan ...