Sciweavers

13591 search results - page 2688 / 2719
» On the Implementation of Dynamic Evaluation
Sort
View
JCS
2010
135views more  JCS 2010»
14 years 8 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
JIDM
2010
155views more  JIDM 2010»
14 years 8 months ago
DeweyIDs - The Key to Fine-Grained Management of XML Documents
Because XML documents tend to be very large and are more and more collaboratively processed, their fine-grained storage and management is a must for which, in turn, a flexible tree...
Michael Peter Haustein, Theo Härder, Christia...
KBSE
2010
IEEE
14 years 8 months ago
Solving string constraints lazily
Decision procedures have long been a fixture in program analysis, and reasoning about string constraints is a key element in many program analyses and testing frameworks. Recent ...
Pieter Hooimeijer, Westley Weimer
MATES
2010
Springer
14 years 8 months ago
Unifying Agent and Component Concepts: Jadex Active Components
The construction of distributed applications is a challenging task due to inherent system properties like message passing and concurrency. Current technology trends further increas...
Alexander Pokahr, Lars Braubach, Kai Jander
87
Voted
MICS
2010
81views more  MICS 2010»
14 years 8 months ago
Tactics for Hierarchical Proof
Abstract. There is something of a discontinuity at the heart of popular tactical theorem provers. Low-level, fully-checked mechanical proofs are large trees consisting of primitive...
David Aspinall, Ewen Denney, Christoph Lüth
« Prev « First page 2688 / 2719 Last » Next »