Sciweavers

49 search results - page 10 / 10
» A Lexicalized Tree Kernel for Open Information Extraction
Sort
View
CCS
2008
ACM
13 years 7 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
ANCS
2007
ACM
13 years 9 months ago
A programmable message classification engine for session initiation protocol (SIP)
Session Initiation Protocol (SIP) has begun to be widely deployed for multiple services such as VoIP, Instant Messaging and Presence. Each of these services uses different SIP mes...
Arup Acharya, Xiping Wang, Charles Wright
HOTOS
2007
IEEE
13 years 8 months ago
HotComments: How to Make Program Comments More Useful?
Program comments have long been used as a common practice for improving inter-programmer communication and code readability, by explicitly specifying programmers' intentions ...
Lin Tan, Ding Yuan, Yuanyuan Zhou
WCRE
2003
IEEE
13 years 10 months ago
GUI Ripping: Reverse Engineering of Graphical User Interfaces for Testing
Graphical user interfaces (GUIs) are important parts of today’s software and their correct execution is required to ensure the correctness of the overall software. A popular tec...
Atif M. Memon, Ishan Banerjee, Adithya Nagarajan