Sciweavers

12697 search results - page 70 / 2540
» Call for Papers
Sort
View
FGCN
2007
IEEE
15 years 6 months ago
Supporting Deadline Monotonic Policy over 802.11 MAC Layer Service Time Distribution
In this paper, we propose a real time scheduling policy over 802.11 DCF protocol called Deadline Monotonic (DM). We evaluate the performance of this policy for a simple scenario w...
Inès El Korbi, Leïla Azouz Saïdan...
65
Voted
SAS
2004
Springer
106views Formal Methods» more  SAS 2004»
15 years 5 months ago
A Relational Approach to Interprocedural Shape Analysis
This paper addresses the verification of properties of imperative programs with recursive procedure calls, heap-allocated storage, and destructive updating of pointer-valued fiel...
Bertrand Jeannet, Alexey Loginov, Thomas W. Reps, ...
TPHOL
1999
IEEE
15 years 4 months ago
Integrating Gandalf and HOL
Gandalf is a first-order resolution theorem-prover, optimized for speed and specializing in manipulations of large clauses. In this paper I describe GANDALF TAC, a HOL tactic that ...
Joe Hurd
PODS
1991
ACM
93views Database» more  PODS 1991»
15 years 3 months ago
The Expressiveness of a Family of Finite Set Languages
In this paper we characterise exactly the complexity of a set based database language called SRL, which presents a unified framework for queries and updates. By imposing simple s...
Neil Immerman, Sushant Patnaik, David W. Stemple
CRYPTO
2004
Springer
126views Cryptology» more  CRYPTO 2004»
15 years 5 months ago
Compressed Pairings
Pairing-based cryptosystems rely on bilinear non-degenerate maps called pairings, such as the Tate and Weil pairings defined over certain elliptic curve groups. In this paper we s...
Michael Scott, Paulo S. L. M. Barreto