Sciweavers

317 search results - page 63 / 64
» Spatial Reasoning: Theory and Practice
Sort
View
CCS
2010
ACM
13 years 5 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
PERVASIVE
2008
Springer
13 years 5 months ago
Localized power-aware routing in linear wireless sensor networks
Energy-efficency is a key concern when designing protocols for wireless sensor networks (WSN). This is of particular importance in commercial applications where demonstrable retur...
Marco Zimmerling, Waltenegus Dargie, Johnathan M. ...
SIGOPS
2008
123views more  SIGOPS 2008»
13 years 5 months ago
The case for active block layer extensions
Self-managing storage systems have recently received attention from the research community due to their promised ability of continuously adapting to best reflect high-level system...
Jorge Guerra, Luis Useche, Medha Bhadkamkar, Ricar...
CORR
2004
Springer
151views Education» more  CORR 2004»
13 years 5 months ago
Finite-Tree Analysis for Constraint Logic-Based Languages: The Complete Unabridged Version
Logic languages based on the theory of rational, possibly infinite, trees have much appeal in that rational trees allow for faster unification (due to the safe omission of the occ...
Roberto Bagnara, Roberta Gori, Patricia M. Hill, E...
APLAS
2010
ACM
13 years 4 months ago
Type Inference for Sublinear Space Functional Programming
We consider programming language aspects of algorithms that operate on data too large to fit into memory. In previous work we have introduced IntML, a functional programming langu...
Ugo Dal Lago, Ulrich Schöpp