Sciweavers

5687 search results - page 146 / 1138
» Visualizing Evaluation in Scheme
Sort
View
ICC
2007
IEEE
269views Communications» more  ICC 2007»
15 years 4 months ago
A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks
–The many-to-one traffic pattern dominates in sensor networks, where a large number of sensor nodes send data to one sink. A sensor node may only communicate with a small portion...
Xiaojiang Du, Yang Xiao, Song Ci, Mohsen Guizani, ...
INFOCOM
2005
IEEE
15 years 3 months ago
FISSIONE: a scalable constant degree and low congestion DHT scheme based on Kautz graphs
Abstract— The distributed hash table (DHT) scheme has become the core component of many large-scale peer-to-peer networks. Degree, diameter, and congestion are important measures...
Dongsheng Li, Xicheng Lu, Jie Wu
ADC
2005
Springer
113views Database» more  ADC 2005»
15 years 3 months ago
Schemes of Storing XML Query Cache
XML query caching for XML database-backed Web applications began to be investigated recently. However, the issue of how the cached query results are stored has not been addressed ...
Hyunchul Kang, Seungchul Han, Younghyun Kim
EDBTW
2004
Springer
15 years 3 months ago
Engineering Incentive Schemes for Ad Hoc Networks
In ad hoc networks, devices have to cooperate in order to compensate for the absence of infrastructure. Yet, autonomous devices tend to abstain from cooperation in order to save th...
Philipp Obreiter, Birgitta König-Ries, Georgi...
JFP
2008
109views more  JFP 2008»
14 years 10 months ago
An operational semantics for Scheme
This paper presents an operational semantics for the core of Scheme. Our specification improves over the denotational semantics from the Revised5 Report on Scheme specification in...
Jacob Matthews, Robert Bruce Findler