Sciweavers

4340 search results - page 833 / 868
» Formal Methods and Cryptography
Sort
View
HM
2007
Springer
137views Optimization» more  HM 2007»
15 years 10 months ago
A Hybrid VNS for Connected Facility Location
The connected facility location (ConFL) problem generalizes the facility location problem and the Steiner tree problem in graphs. Given a graph G = (V, E), a set of customers D ⊆...
Ivana Ljubic
ICCS
2007
Springer
15 years 10 months ago
Quo Vadis, CS? - On the (non)-Impact of Conceptual Structures on the Semantic Web
Abstract. Conceptual Structures is a field of research which shares abstract concepts and interests with recent work on knowledge representation for the Semantic Web. However, whi...
Sebastian Rudolph, Markus Krötzsch, Pascal Hi...
IPSN
2007
Springer
15 years 10 months ago
FlashDB: dynamic self-tuning database for NAND flash
FlashDB is a self-tuning database optimized for sensor networks using NAND flash storage. In practical systems flash is used in different packages such as on-board flash chips,...
Suman Nath, Aman Kansal
MEMOCODE
2006
IEEE
15 years 10 months ago
Latency-insensitive design and central repetitive scheduling
The theory of latency-insensitive design (LID) was recently invented to cope with the time closure problem in otherwise synchronous circuits and programs. The idea is to allow the...
Julien Boucaron, Robert de Simone, Jean-Vivien Mil...
ACL2
2006
ACM
15 years 10 months ago
A verifying core for a cryptographic language compiler
A verifying compiler is one that emits both object code and a proof of correspondence between object and source code.1 We report the use of ACL2 in building a verifying compiler f...
Lee Pike, Mark Shields, John Matthews