Sciweavers

828 search results - page 90 / 166
» On the Design and Implementation of Interactive XML Applicat...
Sort
View
APLAS
2010
ACM
14 years 10 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
CHI
2006
ACM
15 years 10 months ago
Answering why and why not questions in user interfaces
Modern applications such as Microsoft Word have many automatic features and hidden dependencies that are frequently helpful but can be mysterious to both novice and expert users. ...
Brad A. Myers, David A. Weitzman, Andrew Jensen Ko...
MOBILITY
2009
ACM
15 years 4 months ago
Widgets mobility
Widgets are becoming a natural way to design small, intuitive application, and their usage is becoming widespread on both the desktop and the mobile world. However, most widgets s...
Jean Le Feuvre, Cyril Concolato, Jean-Claude Dufou...
ICDE
2004
IEEE
151views Database» more  ICDE 2004»
15 years 11 months ago
Benchmarking SAP R/3 Archiving Scenarios
According to a survey of the University of Berkeley [6], about 5 Exabytes of new information has been created in 2002. This information explosion affects also the database volumes...
Bernhard Zeller, Alfons Kemper
ELPUB
2006
ACM
15 years 3 months ago
Knowledge-Based Search in Collections of Digitized Manuscripts: First Results
The paper presents in brief a methodology for development of tools for knowledge-based search in repositories of digitized manuscripts. It is designated to assist the search activ...
Pavel Pavlov, Maria Nisheva-Pavlova