Sciweavers

599 search results - page 62 / 120
» The repeater tree construction problem
Sort
View
CORR
2010
Springer
133views Education» more  CORR 2010»
15 years 4 months ago
On Byzantine Containment Properties of the $min+1$ Protocol
Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of a...
Swan Dubois, Toshimitsu Masuzawa, Sébastien...
ESWA
2006
110views more  ESWA 2006»
15 years 4 months ago
XKey: A tool for the generation of identification keys
This paper presents the development of XKey, a tool for generating taxonomical identification keys by means of decision tree construction. The tool is based on an XML standard for...
Miguel Delgado Calvo-Flores, Waldo Fajardo Contrer...
DKE
2007
136views more  DKE 2007»
15 years 4 months ago
Deciding XPath containment with MSO
XPath is the standard language for addressing parts of an XML document. We present a sound and complete decision procedure for containment of XPath queries. The considered XPath f...
Pierre Genevès, Nabil Layaïda
CSFW
2012
IEEE
13 years 6 months ago
Information-Flow Security for a Core of JavaScript
—Tracking information flow in dynamic languages remains an important and intricate problem. This paper makes substantial headway toward understanding the main challenges and res...
Daniel Hedin, Andrei Sabelfeld
ALGORITHMICA
1998
118views more  ALGORITHMICA 1998»
15 years 4 months ago
On the Analysis of Linear Probing Hashing
Abstract. This paper presents moment analyses and characterizations of limit distributions for the construction cost of hash tables under the linear probing strategy. Two models ar...
Philippe Flajolet, Patricio V. Poblete, Alfredo Vi...