Sciweavers

2362 search results - page 393 / 473
» Programming in Standard ML
Sort
View
CORR
2008
Springer
111views Education» more  CORR 2008»
14 years 10 months ago
XML Rewriting Attacks: Existing Solutions and their Limitations
Web Services are web-based applications made available for web users or remote Web-based programs. In order to promote interoperability, they publish their interfaces in the so-ca...
Azzedine Benameur, Faisal Abdul Kadir, Serge Fenet
FAC
2008
114views more  FAC 2008»
14 years 9 months ago
Specification of communicating processes: temporal logic versus refusals-based refinement
Abstract. In this paper we consider the relationship between refinement-oriented specification and specifications using a temporal logic. We investigate the extent to which one can...
Gavin Lowe
CORR
2006
Springer
100views Education» more  CORR 2006»
14 years 9 months ago
Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels
This paper describes an efficient implementation of binning for decode-and-forward (DF) in relay channels using lowdensity parity-check (LDPC) codes. Bilayer LDPC codes are devised...
Peyman Razaghi, Wei Yu
ENTCS
2006
168views more  ENTCS 2006»
14 years 9 months ago
Case Study: Model Transformations for Time-triggered Languages
In this study, we introduce a model transformation tool for a time-triggered language: Giotto. The tool uses graphs to represent the source code (Giotto) and the target (the sched...
Tivadar Szemethy
IJRR
2008
242views more  IJRR 2008»
14 years 9 months ago
Bilateral Symmetry Detection for Real-time Robotics Applications
Bilateral symmetry is a salient visual feature of many man-made objects. In this paper, we present research that use bilateral symmetry to identify, segment and track objects in re...
Wai Ho Li, Alan M. Zhang, Lindsay Kleeman