Sciweavers

1192 search results - page 88 / 239
» Computing Weakest Readings
Sort
View

Book
296views
17 years 1 months ago
Implementing Functional Languages: a tutorial
"This book gives a practical approach to understanding implementations of non-strict functional languages using lazy graph reduction. The book is intended to be a source of pr...
Simon Peyton Jones, David Lester
222
Voted

Book
2145views
17 years 1 months ago
An Introduction to Binary Search Trees and Balanced Trees
"Libavl is a library in ANSI C for manipulation of various types of binary trees. This book provides an introduction to binary tree techniques and presents all of Libavl’s ...
Ben Pfaff

Book
310views
16 years 11 months ago
Mastering Enterprise JavaBeans Third Edition
"Published in January 2005, the best-selling book Mastering EJB is now in its third edition and has been updated for EJB2.1 and also features new chapters on security and Web ...
Ed Roman, Rima Patel Sriganesh, and Gerald Brose
109
Voted
CONCUR
2005
Springer
15 years 9 months ago
Timed Spi-Calculus with Types for Secrecy and Authenticity
Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
Christian Haack, Alan Jeffrey
102
Voted
NORDICHI
2004
ACM
15 years 9 months ago
Requirements for a multimedia museum environment
In this paper we describe a two-part study that was used to establish the requirements for an interactive museum environment for children aged between 5 and 10. The paper outlines...
Emanuela Mazzone, Matthew Horton, Janet C. Read