Sciweavers

3090 search results - page 529 / 618
» Document Processing with LinkIT
Sort
View
LPAR
2007
Springer
15 years 6 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
104
Voted
SAFECOMP
2007
Springer
15 years 6 months ago
Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System
A strategy and relating activities of a software safety analysis (SSA) are presented for the software of a digital reactor protection system where software modules in the design de...
Gee-Yong Park, Jang-Soo Lee, Se Woo Cheon, Kee-Cho...
138
Voted
VLDB
2007
ACM
229views Database» more  VLDB 2007»
15 years 6 months ago
Sum-Max Monotonic Ranked Joins for Evaluating Top-K Twig Queries on Weighted Data Graphs
In many applications, the underlying data (the web, an XML document, or a relational database) can be seen as a graph. These graphs may be enriched with weights, associated with t...
Yan Qi 0002, K. Selçuk Candan, Maria Luisa ...
97
Voted
ISESE
2006
IEEE
15 years 6 months ago
Evaluating the efficacy of test-driven development: industrial case studies
This paper discusses software development using the Test Driven Development (TDD) methodology in two different environments (Windows and MSN divisions) at Microsoft. In both these...
Thirumalesh Bhat, Nachiappan Nagappan
123
Voted
GIR
2006
ACM
15 years 6 months ago
Inferring Geographical Ontologies from Multiple Resources for Geographical Information Retrieval
Many documents that can be found in the World Wide Web include some kind of geographical information, often in an implicit way. The use of resources like gazetteers and geographic...
Davide Buscaldi, Paolo Rosso, Piedachu Peris