Sciweavers

2036 search results - page 381 / 408
» Using and Abusing XML
Sort
View
APLAS
2010
ACM
15 years 1 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
BMCBI
2010
122views more  BMCBI 2010»
15 years 1 months ago
An overview of the CellML API and its implementation
Background: CellML is an XML based language for representing mathematical models, in a machine-independent form which is suitable for their exchange between different authors, and...
Andrew K. Miller, Justin Marsh, Adam Reeve, Alan G...
BMCBI
2006
115views more  BMCBI 2006»
15 years 1 months ago
AgdbNet - antigen sequence database software for bacterial typing
Background: Bacterial typing schemes based on the sequences of genes encoding surface antigens require databases that provide a uniform, curated, and widely accepted nomenclature ...
Keith A. Jolley, Martin C. J. Maiden
ICDE
2006
IEEE
232views Database» more  ICDE 2006»
16 years 2 months ago
Dual Labeling: Answering Graph Reachability Queries in Constant Time
Graph reachability is fundamental to a wide range of applications, including XML indexing, geographic navigation, Internet routing, ontology queries based on RDF/OWL, etc. Many ap...
Haixun Wang, Hao He, Jeffrey Xu Yu, Jun Yang 0001,...
WWW
2004
ACM
16 years 2 months ago
Analysis of interacting BPEL web services
This paper presents a set of tools and techniques for analyzing interactions of composite web services which are specified in BPEL and communicate through asynchronous XML message...
Xiang Fu, Tevfik Bultan, Jianwen Su