Sciweavers

2036 search results - page 4 / 408
» Using and Abusing XML
Sort
View
115
Voted
NDSS
2003
IEEE
15 years 8 months ago
Moderately Hard, Memory-Bound Functions
A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. It has been sugge...
Martín Abadi, Michael Burrows, Ted Wobber
101
Voted
PAM
2012
Springer
13 years 10 months ago
Detecting Pedophile Activity in BitTorrent Networks
Abstract. The wide spread of Peer-to-Peer networks makes multimedia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal ...
Moshe Rutgaizer, Yuval Shavitt, Omer Vertman, Noa ...
131
Voted
WWW
2003
ACM
16 years 3 months ago
Making XML Schema Easier to Read and Write
XML Schema is a rather complex schema language, partly because of its inherent complexity, and partly because of its XML syntax. In an effort to reduce the syntactic verboseness a...
Erik Wilde, Kilian Stillhard
126
Voted
SAC
2006
ACM
15 years 8 months ago
Investigating the use of summarisation for interactive XML retrieval
As the number of components in XML documents is much larger than that of ‘flat’ documents, we believe it is essential to provide users of XML information retrieval systems wi...
Zoltán Szlávik, Anastasios Tombros, ...
125
Voted
GI
2004
Springer
15 years 8 months ago
Type Safe Programming of XML-based Applications
: There is an emerging amount of software for generating and manipulating XML documents. This paper addresses the problem of guaranteeing the validity of dynamically generated XML ...
Martin Kempa, Volker Linnemann