… This paper presents an operational semantics for the core of Scheme. Our … on Scheme specification in four ways. First, it covers a larger part of the language … of the language. Third, it provides a faithful model of Scheme’s undefined order …
JFP, 18(1):47-86, 2008. [doi]… A regeneration scheme is presented which shows how to change the computation staging of a generating extension by a two-level metasystem structure using … transformations under a general scheme. …
ipl, 62(3):127-134, 1997. [doi]… protocols are built. However, most of the existing key management schemes … the certification service. The feasibility of the proposed scheme is verified by some simulation studies. The results show the effectiveness of the scheme. …
dexaw 2007: 615-619 [doi]… concern. In this paper, we propose a novel Internet-based scheme to tackle this problem. Input to the proposed scheme is a graph corresponding to a digital system … linear feedback shift register(LFSR)-based locking scheme. The proposed scheme …
sbcci 2009: [doi]… query languages and content generation schemes for most of these : CSS selectors, XPath, various templating schemes. These tend to suffer from interpretation overhead, or from injection vulnerabilities, or both.
This scheme extends …
http://wiki.ecmascript.org/doku.php?id=harmony:quasis, 2011. [doi]… protocols are built. However, most of the existing key management schemes … scheme, a collection of nodes acts as the certificate authority and provides the certification service. The feasibility of the proposed scheme is verified …
icdcit 2007: 97-109 [doi]… establishment scheme for ad hoc networks based on distributed trust model … chains and very high probability. The simulation results show that our scheme …
iccta 2007: 51-58 [doi]… a threshold scheme to secure the tokens needed for accessing the system. …
IEEEares 2008: 39-46 [doi]… authenticity and confidentiality of the data be assured. Digital signature schemes … organization structures. Existing schemes for DAGs are authenticity-preserving … information during authentication.
In this paper, we propose two schemes on how …
edbt 2010: 609-620 [doi]… Abstract State Machines, Prolog, and Scheme are well-established for language engineering in the technological space of grammarware. In this paper, we show how … Machines, Prolog, and Scheme as description languages in EProvide 2.0, an extensible …
TOOLS 2009: [doi]… of the proposed multilevel scheme, such as different initial greedy …
amc, 318:227-244, 2018. [doi]… Distributed database systems exploit static workload characteristics to steer data fragmentation and data allocation schemes. However, the grand challenge of distributed query processing is to come up with a self-organizing architecture …
edbt 2010: 75-86 [doi]… scheme is commonly recognized as the most efficient compression scheme in terms … scheme that improves significantly over WAH compression by better utilizing …
edbt 2010: 228-239 [doi]… this paper is divided into three sections. The first presents a classification scheme for the types of divergences that partial evaluators experience and a discussion of different forms of termination (reuse) mechanisms. Next, use-analysis …
PEPM 1992: 29-37… and higher-order procedures, such as Ruby, Perl, ML and Scheme. These language … for higher-order languages, particularly Scheme. We then resolve … and static aspects. We implement the language as an extension to Scheme. By exploiting …
SCP, 63(3):207-239, 2006. [doi]… schemes, the optimized LT coded FSK is the most energy-efficient scheme … the optimized uncoded FSK outperforms coded schemes for d < d_T , the energy gap … coded schemes. These results come from the flexibility of the LT code to adjust …
2010: [doi]