Sciweavers

4753 search results - page 698 / 951
» Natural Modelling of Interactive Applications
Sort
View
ASIACRYPT
2008
Springer
15 years 5 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
240
Voted
ICDE
2008
IEEE
218views Database» more  ICDE 2008»
16 years 4 months ago
AxPRE Summaries: Exploring the (Semi-)Structure of XML Web Collections
The nature of semistructured data in web collections is evolving. Increasingly, XML web documents (or documents exchanged via web services) are valid with regard to a schema, yet ...
Mariano P. Consens, Flavio Rizzolo, Alejandro A. V...
118
Voted
SIGMOD
2002
ACM
134views Database» more  SIGMOD 2002»
16 years 3 months ago
QURSED: querying and reporting semistructured data
QURSED enables the development of web-based query forms and reports (QFRs) that query and report semistructured XML data, i.e., data that are characterized by nesting, irregularit...
Yannis Papakonstantinou, Michalis Petropoulos, Vas...
166
Voted
SEMCO
2009
IEEE
15 years 10 months ago
Detecting Attempts at Humor in Multiparty Meetings
Abstract—Systems designed for the automatic summarization of meetings have considered the propositional content of contributions by each speaker, but not the explicit techniques ...
Kornel Laskowski
125
Voted
AMI
2009
Springer
15 years 10 months ago
I Bet You Look Good on the Wall: Making the Invisible Computer Visible
The design ideal of the invisible computer, prevalent in the vision of ambient intelligence (AmI), has led to a number of interaction challenges. The complex nature of AmI environm...
Jo Vermeulen, Jonathan Slenders, Kris Luyten, Kari...