Sciweavers

13277 search results - page 2575 / 2656
» An Approach to Clustering Abstracts
Sort
View
CAISE
2005
Springer
15 years 6 months ago
A Meta Model for Process Mining Data
Abstract. Modern process-aware information systems store detailed information about processes as they are being executed. This kind of information can be used for very different p...
Boudewijn F. van Dongen, Wil M. P. van der Aalst
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
105
Voted
ECAL
2005
Springer
15 years 6 months ago
A Co-evolutionary Epidemiological Model for Artificial Life and Death
Abstract. This paper presents a model of the co-evolution of transmissible disease and a population of non-randomly mixed susceptible agents. The presence of the disease elements i...
Alan Dorin
ER
2005
Springer
200views Database» more  ER 2005»
15 years 6 months ago
How to Tame a Very Large ER Diagram (Using Link Analysis and Force-Directed Drawing Algorithms)
Abstract. Understanding a large schema without the assistance of persons already familiar with it (and its associated applications), is a hard and very time consuming task that occ...
Yannis Tzitzikas, Jean-Luc Hainaut
ESOP
2005
Springer
15 years 6 months ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow
« Prev « First page 2575 / 2656 Last » Next »