Sciweavers

12697 search results - page 70 / 2540
» Call for Papers
Sort
View
FGCN
2007
IEEE
15 years 12 months ago
Supporting Deadline Monotonic Policy over 802.11 MAC Layer Service Time Distribution
In this paper, we propose a real time scheduling policy over 802.11 DCF protocol called Deadline Monotonic (DM). We evaluate the performance of this policy for a simple scenario w...
Inès El Korbi, Leïla Azouz Saïdan...
SAS
2004
Springer
106views Formal Methods» more  SAS 2004»
15 years 11 months ago
A Relational Approach to Interprocedural Shape Analysis
This paper addresses the verification of properties of imperative programs with recursive procedure calls, heap-allocated storage, and destructive updating of pointer-valued fiel...
Bertrand Jeannet, Alexey Loginov, Thomas W. Reps, ...
TPHOL
1999
IEEE
15 years 9 months ago
Integrating Gandalf and HOL
Gandalf is a first-order resolution theorem-prover, optimized for speed and specializing in manipulations of large clauses. In this paper I describe GANDALF TAC, a HOL tactic that ...
Joe Hurd
PODS
1991
ACM
93views Database» more  PODS 1991»
15 years 9 months ago
The Expressiveness of a Family of Finite Set Languages
In this paper we characterise exactly the complexity of a set based database language called SRL, which presents a unified framework for queries and updates. By imposing simple s...
Neil Immerman, Sushant Patnaik, David W. Stemple
CRYPTO
2004
Springer
126views Cryptology» more  CRYPTO 2004»
15 years 11 months ago
Compressed Pairings
Pairing-based cryptosystems rely on bilinear non-degenerate maps called pairings, such as the Tate and Weil pairings defined over certain elliptic curve groups. In this paper we s...
Michael Scott, Paulo S. L. M. Barreto