Sciweavers

4325 search results - page 699 / 865
» Incremental computation with names
Sort
View
SISW
2003
IEEE
15 years 4 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
PADS
2003
ACM
15 years 4 months ago
Maya: a Multi-Paradigm Network Modeling Framework
This paper presents Maya, a multi-paradigm, scalable and extensible network modeling framework for emulating distributed applications. A novel three-tier architecture is proposed ...
Junlan Zhou, Zhengrong Ji, Mineo Takai, Rajive Bag...
ADHOCNOW
2003
Springer
15 years 4 months ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan
ASP
2003
Springer
15 years 4 months ago
Parametric Connectives in Disjunctive Logic Programming
Disjunctive Logic Programming (DLP) is an advanced formalism for Knowledge Representation and Reasoning (KRR). DLP is very expressive in a precise mathematical sense: it allows to ...
Nicola Leone, Simona Perri
AUSAI
2003
Springer
15 years 4 months ago
Information Extraction via Path Merging
Abstract. In this paper, we describe a new approach to information extraction that neatly integrates top-down hypothesis driven information with bottom-up data driven information. ...
Robert Dale, Cécile Paris, Marc Tilbrook