Sciweavers

4325 search results - page 789 / 865
» Incremental computation with names
Sort
View
INDOCRYPT
2001
Springer
15 years 3 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
LPNMR
2001
Springer
15 years 3 months ago
plp: A Generic Compiler for Ordered Logic Programs
Abstract This paper describes a generic compiler, called plp, for translating ordered logic programs into standard logic programs under the answer set semantics. In an ordered logi...
James P. Delgrande, Torsten Schaub, Hans Tompits
ICNP
2000
IEEE
15 years 3 months ago
Differentiated Predictive Fair Service for TCP Flows
The majority of the traffic (bytes) flowing over the Internet today have been attributed to the Transmission Control Protocol (TCP). This strong presence of TCP has recently spu...
Ibrahim Matta, Liang Guo
LCN
2000
IEEE
15 years 3 months ago
Tree-Based Reliable Multicast in Combined Fixed/Mobile IP Networks
This paper proposes a solution to delivering multicast data reliably not only to/from fixed hosts but also to/from mobile hosts in combined fixed/mobile IP networks, particularl...
Wonyong Yoon, Dongman Lee, Chansu Yu, Myungchul Ki...
MOBIHOC
2000
ACM
15 years 3 months ago
Low power rendezvous in embedded wireless networks
ln the future, wireless networking will be embedded into a wide variety of common, everyday objects [1]. In many embedded networking situations, the communicating nodes will be ver...
Terry Todd, Frazer Bennett, Alan Jones