Sciweavers

4725 search results - page 708 / 945
» Dependence-Based Program Analysis
Sort
View
DCOSS
2005
Springer
15 years 10 months ago
Multi-query Optimization for Sensor Networks
The widespread dissemination of small-scale sensor nodes has sparked interest in a powerful new database abstraction for sensor networks: Clients “program” the sensors through ...
Niki Trigoni, Yong Yao, Alan J. Demers, Johannes G...
150
Voted
GECCO
2005
Springer
137views Optimization» more  GECCO 2005»
15 years 10 months ago
Constant generation for the financial domain using grammatical evolution
This study reports the work to date on the analysis of different methodologies for constant creation with the aim of applying the most advantageous method to the dynamic real wor...
Ian Dempsey
ICALP
2005
Springer
15 years 10 months ago
Combining Intruder Theories
Abstract. Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of algebraic operators associated with a fixed intruder theory. Examples o...
Yannick Chevalier, Michaël Rusinowitch
117
Voted
IDA
2005
Springer
15 years 10 months ago
A Knowledge-Based Model for Analyzing GSM Network Performance
Abstract. In this paper, a method to analyze GSM network performance on the basis of massive data records and application domain knowledge is presented. The available measurements ...
Pasi Lehtimäki, Kimmo Raivio
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
15 years 10 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page