Sciweavers

677 search results - page 109 / 136
» Dependent Types from Counterexamples
Sort
View
SOUPS
2009
ACM
15 years 4 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
IROS
2008
IEEE
171views Robotics» more  IROS 2008»
15 years 4 months ago
Action planner of hybrid leg-wheel robots for lunar and planetary exploration
— In this paper, we propose an action planning algorithm and its evaluation method based on dynamic simulation for a novel type of hybrid leg-wheel rover for planetary exploratio...
Eric Rohmer, Giulio Reina, Genya Ishigami, Keiji N...
VLDB
1994
ACM
118views Database» more  VLDB 1994»
15 years 2 months ago
Query Optimization by Predicate Move-Around
A new type of optimization, called predicate move-around, ia introduced. It is shown how this optimization `considerably improvea the efficiency of evaluating SQL queries that hav...
Alon Y. Levy, Inderpal Singh Mumick, Yehoshua Sagi...
ACMICEC
2007
ACM
145views ECommerce» more  ACMICEC 2007»
15 years 1 months ago
Advance selling and internet intermediary: travel distribution strategies in the e-commerce age
We investigate two challenges advance of e-commerce creates for traditional practice of travel distribution. First, we explore whether travel providers benefit from strategically ...
Zhe Qu
AOSD
2009
ACM
15 years 1 months ago
The dataflow pointcut: a formal and practical framework
Some security concerns are sensitive to flow of information in a program execution. The dataflow pointcut has been proposed by Masuhara and Kawauchi in order to easily implement s...
Dima Alhadidi, Amine Boukhtouta, Nadia Belblidia, ...