Sciweavers

1769 search results - page 61 / 354
» An implementation of argument based discussion
Sort
View
PPDP
2009
Springer
15 years 6 months ago
Set functions for functional logic programming
We propose a novel approach to encapsulate non-deterministic computations in functional logic programs. Our approach is based on set functions that return the set of all the resul...
Sergio Antoy, Michael Hanus
INFOCOM
2008
IEEE
15 years 6 months ago
The Power of One Move: Hashing Schemes for Hardware
—In a standard multiple choice hashing scheme, each item is stored in one of d ≥ 2 hash table buckets. The availability of choice in where items are stored improves space utili...
Adam Kirsch, Michael Mitzenmacher
RTA
2004
Springer
15 years 5 months ago
mu-term: A Tool for Proving Termination of Context-Sensitive Rewriting
Restrictions of rewriting can eventually achieve termination by pruning all infinite rewrite sequences issued from every term. Contextsensitive rewriting (CSR) is an example of su...
Salvador Lucas
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 4 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
CONEXT
2007
ACM
15 years 3 months ago
Internet economics: the use of Shapley value for ISP settlement
Within the current Internet, autonomous ISPs implement bilateral agreements, with each ISP establishing agreements that suit its own local objective to maximize its profit. Peerin...
Richard T. B. Ma, Dah-Ming Chiu, John C. S. Lui, V...