Sciweavers

1626 search results - page 188 / 326
» Subtyping with Power Types
Sort
View
ENTCS
2008
140views more  ENTCS 2008»
15 years 5 months ago
Fusing a Transformation Language with an Open Compiler
Transformation systems such as Stratego/XT provide powerful analysis and transformation frameworks and concise languages for language processing, but instantiating them for every ...
Karl Trygve Kalleberg, Eelco Visser
124
Voted
ENTCS
2008
97views more  ENTCS 2008»
15 years 5 months ago
Global State Considered Helpful
Reynolds' view of a storage cell as an expression-acceptor pair has been widely used by researchers. We present a different way of organizing semantics of state, and in parti...
Paul Blain Levy
IJNSEC
2008
110views more  IJNSEC 2008»
15 years 5 months ago
Improvement on Nominative Proxy Signature Schemes
In a nominative proxy signature scheme, an original singer delegates his signing power to a proxy signer, who generates a nominative signature on behalf of the original signer. In...
Zuo-Wen Tan
ISI
2006
Springer
15 years 4 months ago
Content Analysis of Jihadi Extremist Groups' Videos
This paper presents an exploratory study of jihadi extremist groups' videos using content analysis and a multimedia coding tool to explore the types of videos, groups' mo...
Arab Salem, Edna Reid, Hsinchun Chen
146
Voted
CORR
2007
Springer
123views Education» more  CORR 2007»
15 years 4 months ago
Security in Wireless Sensor Networks: Issues and Challenges
 Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology c...
Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon H...