Sciweavers

1151 search results - page 178 / 231
» Collaborative Programming: Applications of Logic and Automat...
Sort
View
149
Voted
APLAS
2010
ACM
15 years 3 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
133
Voted
PLDI
2006
ACM
15 years 9 months ago
Precise alias analysis for static detection of web application vulnerabilities
The number and the importance of web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Kruegel, Engin Kirda
SCCC
2005
IEEE
15 years 9 months ago
Optimizing repair programs for consistent query answering
Databases may not satisfy integrity constraints (ICs) for several reasons. Nevertheless, in most of the cases an important part of the data is still consistent wrt certain desired...
Mónica Caniupán Marileo, Leopoldo E....
INFORMATICALT
2006
89views more  INFORMATICALT 2006»
15 years 3 months ago
Investigation of Examples of E-Education Environment for Scientific Collaboration and Distance Graduate Studies, Part 1
The objective is to investigate two emerging information technologies in graduate studies and scientific cooperation. Internet is the first technology. The open source is the secon...
Jonas Mockus
136
Voted
ML
2010
ACM
175views Machine Learning» more  ML 2010»
14 years 10 months ago
Concept learning in description logics using refinement operators
With the advent of the Semantic Web, description logics have become one of the most prominent paradigms for knowledge representation and reasoning. Progress in research and applica...
Jens Lehmann, Pascal Hitzler