Sciweavers

1492 search results - page 267 / 299
» Automatic Software Model Checking Using CLP
Sort
View
ICIA
2007
14 years 12 months ago
An Intelligent Discussion-Bot for Guiding Student Interactions in Threaded Discussions
Although there are high expectations for collaborative discussion and on-line learning, existing systems for on-line discussion and chat facilities are not fully effective in prom...
Jihie Kim, Erin Shaw, Grace Chern, Donghui Feng
FSTTCS
2003
Springer
15 years 2 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
78
Voted
ICDAR
2009
IEEE
14 years 7 months ago
Analysis of Book Documents' Table of Content Based on Clustering
Table of contents (TOC) recognition has attracted a great deal of attention in recent years. After reviewing the merits and drawbacks of the existing TOC recognition methods, we h...
Liangcai Gao, Zhi Tang, Xiaofan Lin, Xin Tao, Yimi...
ESOP
2005
Springer
15 years 3 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
AINTEC
2007
Springer
15 years 3 months ago
WOD - Proxy-Based Web Object Delivery Service
With the tremendous growth of World Wide Web (WWW), the door has been opened to a multitude of services and information for even the most casual of users. Today, many wireless and ...
Kai-Hsiang Yang, Jan-Ming Ho