Sciweavers

2372 search results - page 384 / 475
» Probabilistic calling context
Sort
View
DKE
2006
110views more  DKE 2006»
15 years 21 days ago
Efficient recursive XML query processing using relational database systems
Recursive queries are quite important in the context of XML databases. In addition, several recent papers have investigated a relational approach to store XML data and there is gr...
Sandeep Prakash, Sourav S. Bhowmick, Sanjay Kumar ...
ENTCS
2006
173views more  ENTCS 2006»
15 years 21 days ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
86
Voted
ENTCS
2006
144views more  ENTCS 2006»
15 years 21 days ago
Infinitary Howe's Method
Howe's method is a well-known technique for proving that various kinds of applicative bisimilarity (or similarity) on a functional language are congruences (or precongruences...
Paul Blain Levy
99
Voted
ETS
2006
IEEE
119views Hardware» more  ETS 2006»
15 years 21 days ago
An Ontology-Based Framework for Bridging Learning Design and Learning Content
The paper describes an ontology-based framework for bridging learning design and learning object content. In present solutions, researchers have proposed conceptual models and dev...
Colin Knight, Dragan Gasevic, Griff Richards
129
Voted
INFSOF
2008
121views more  INFSOF 2008»
15 years 21 days ago
A test driven approach for aspectualizing legacy software using mock systems
Aspect-based refactoring, called aspectualization, involves moving program code that implements cross-cutting concerns into aspects. Such refactoring can improve the maintainabili...
Michael Mortensen, Sudipto Ghosh, James M. Bieman