Sciweavers

1465 search results - page 57 / 293
» Making the Correct Mistakes
Sort
View
JDCTA
2010
187views more  JDCTA 2010»
14 years 6 months ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang
JCDL
2010
ACM
143views Education» more  JCDL 2010»
15 years 5 months ago
ProcessTron: efficient semi-automated markup generation for scientific documents
Digitizing legacy documents and marking them up with XML is important for many scientific domains. However, creating comprehensive semantic markup of high quality is challenging. ...
Guido Sautter, Klemens Böhm, Conny Kühne...
FLAIRS
2008
15 years 2 months ago
Diagnosing Natural Language Answers to Support Adaptive Tutoring
Understanding answers to open-ended explanation questions is important in intelligent tutoring systems. Existing systems use natural language techniques in essay analysis, but rev...
Myroslava Dzikovska, Gwendolyn E. Campbell, Charle...
VLDB
1990
ACM
56views Database» more  VLDB 1990»
15 years 3 months ago
Two Epoch Algorithms for Disaster Recovery
Remotebackup copies of databasesare often maintained to ensureavailability of dataevenin thepresenceof extensive failures, for which local replication mechanismsmay be inadequate....
Hector Garcia-Molina, Christos A. Polyzois, Robert...
CLIMA
2008
15 years 1 months ago
Verifying Agents' Conformance with Multiparty Protocols
The paper deals with the problem of agents conformance with multiparty protocols. We introduce a notion of conformance of a set of k agents with a multiparty protocol with k roles,...
Laura Giordano, Alberto Martelli