Sciweavers

441 search results - page 78 / 89
» The logical approach to stack typing
Sort
View
CADE
2008
Springer
15 years 9 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
CADE
2002
Springer
15 years 9 months ago
Basic Syntactic Mutation
Modularity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Michael Abbott, Neil Ghani, and Christoph L?uth Union of Equational Theo...
Christopher Lynch, Barbara Morawska
79
Voted
CCGRID
2005
IEEE
15 years 3 months ago
Semantic integration of file-based data for grid services
Data services for the Grid have focussed so far primarily on virtualising access to distributed databases, and encapsulating file location. However, orchestration of services requ...
Andrew Woolf, Ray Cramer, Marta Gutierrez, Kerstin...
93
Voted
APWEB
2005
Springer
15 years 3 months ago
Integrating Web Services into Ontology-Based Web Portal
With the explosive emerged Web services, the Web becomes a world of information and applications. So portals whose goal is presenting a structured view onto the Web should provide ...
Jian Zhou, Yong Yu, Lei Zhang, Chenxi Lin, Yin Yan...
DAS
2004
Springer
15 years 2 months ago
Recognizing Freeform Digital Ink Annotations
Annotations on digital documents have clear advantages over annotations on paper. They can be archived, shared, searched, and easily manipulated. Freeform digital ink annotations a...
Michael Shilman, Zile Wei