Sciweavers

1192 search results - page 208 / 239
» Computing Weakest Readings
Sort
View
126
Voted
GCC
2003
Springer
15 years 7 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
98
Voted
SPAA
2010
ACM
15 years 6 months ago
Transactions in the jungle
Transactional memory (TM) has shown potential to simplify the task of writing concurrent programs. Inspired by classical work on databases, formal definitions of the semantics of...
Rachid Guerraoui, Thomas A. Henzinger, Michal Kapa...
CIE
2010
Springer
15 years 6 months ago
Focusing in Asynchronous Games
Game semantics provides an interactive point of view on proofs, which enables one to describe precisely their dynamical behavior during cut elimination, by considering formulas as ...
Samuel Mimram
JCDL
2009
ACM
150views Education» more  JCDL 2009»
15 years 6 months ago
Science teachers' use of online resources and the digital library for Earth system education
A three-part study of teachers’ use of online resources and of the Digital Library for Earth System Education (DLESE) was conducted from 2004 through summer 2006. The first two ...
Lecia Jane Barker
HUC
2009
Springer
15 years 6 months ago
HydroSense: infrastructure-mediated single-point sensing of whole-home water activity
Recent work has examined infrastructure-mediated sensing as a practical, low-cost, and unobtrusive approach to sensing human activity in the physical world. This approach is based...
Jon Froehlich, Eric Larson, Tim Campbell, Conor Ha...