Sciweavers

3679 search results - page 672 / 736
» Hybrid Semantic Analysis
Sort
View
98
Voted
RIDE
2002
IEEE
15 years 5 months ago
ebXML: Status, Research Issues, and Obstacles
Technologies and approaches in the field of Electronic Commerce are not mature enough in order to allow for their broad successful commercial application. Neither existing, succes...
Birgit Hofreiter, Christian Huemer, Wolfgang Klas
119
Voted
ITCC
2000
IEEE
15 years 5 months ago
Towards Knowledge Discovery from WWW Log Data
As the result of interactions between visitors and a web site, an http log file contains very rich knowledge about users on-site behaviors, which, if fully exploited, can better c...
Feng Tao, Fionn Murtagh
ECOOP
1999
Springer
15 years 4 months ago
Inlining of Virtual Methods
We discuss aspects of inlining of virtual method invocations. First, we introduce a new method test to guard inlinings of such invocations, with a di erent set of tradeo s from the...
David Detlefs, Ole Agesen
117
Voted
LICS
1999
IEEE
15 years 4 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
KBSE
1998
IEEE
15 years 4 months ago
Specification-based Browsing of Software Component Libraries
Specification-based retrieval provides exact contentoriented access to component libraries but requires too much deductive power. Specification-based browsing evades this bottlene...
B. Fischer