Sciweavers

163 search results - page 31 / 33
» Type Systems for Useless-Variable Elimination
Sort
View
ATAL
2009
Springer
14 years 1 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
FC
2004
Springer
89views Cryptology» more  FC 2004»
14 years 2 days ago
Electronic National Lotteries
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost eļ¬...
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. S...
EDBT
2009
ACM
133views Database» more  EDBT 2009»
13 years 11 months ago
Schema-conscious filtering of XML documents
In a publish-subscribe system based on ļ¬ltering of XML documents, subscribers specify their interests with proļ¬les expressed in the XPath language. The system processes a stre...
Panu Silvasti, Seppo Sippu, Eljas Soisalon-Soinine...
ICDCS
2010
IEEE
13 years 8 months ago
Minimizing Probing Cost and Achieving Identifiability in Network Link Monitoring
Continuously monitoring the link performance is important to network diagnosis. Recently, active probes sent between end systems are widely used to monitor the link performance. I...
Qiang Zheng, Guohong Cao
AI
2004
Springer
13 years 6 months ago
Order-sorted logic programming with predicate hierarchy
Order-sorted logic has been formalized as first-order logic with sorted terms where sorts are ordered to build a hierarchy (called a sort-hierarchy). These sorted logics lead to u...
Ken Kaneiwa