Sciweavers

6047 search results - page 901 / 1210
» Modeling with Extend
Sort
View
ACISP
2008
Springer
15 years 10 months ago
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 ce...
Sebastian Gajek, Mark Manulis, Jörg Schwenk
SEMCO
2007
IEEE
15 years 10 months ago
Integrating Semantic Knowledge into Text Similarity and Information Retrieval
This paper studies the influence of lexical semantic knowledge upon two related tasks: ad-hoc information retrieval and text similarity. For this purpose, we compare the performa...
Christof Müller, Iryna Gurevych, Max Müh...
ICDM
2005
IEEE
148views Data Mining» more  ICDM 2005»
15 years 9 months ago
Hot Item Mining and Summarization from Multiple Auction Web Sites
Online auction Web sites are fast changing, highly dynamic, and complex as they involve tremendous sellers and potential buyers, as well as a huge amount of items listed for biddi...
Tak-Lam Wong, Wai Lam
ICLP
2005
Springer
15 years 9 months ago
A Type System for CHR
Abstract. We propose a generic type system for the Constraint Handling Rules (CHR), a rewriting rule language for implementing constraint solvers. CHR being a high-level extension ...
Emmanuel Coquery, François Fages
CONCUR
1997
Springer
15 years 8 months ago
Modularity for Timed and Hybrid Systems
Abstract. In a trace-based world, the modular speci cation, veri cation, and control of live systems require each module to be receptive that is, each module must be able to meet i...
Rajeev Alur, Thomas A. Henzinger