Sciweavers

288 search results - page 52 / 58
» Virtual Machines, Managed Code and Component Technology
Sort
View
82
Voted
AIL
2006
130views more  AIL 2006»
14 years 9 months ago
Extractive summarisation of legal texts
We describe research carried out as part of a text summarisation project for the legal domain for which we use a new XML corpus of judgments of the UK House of Lords. These judgmen...
Ben Hachey, Claire Grover
75
Voted
CAISE
2006
Springer
15 years 1 months ago
A Method for Functional Alignment Verification in Hierarchical Enterprise Models
Enterprise modeling involves multiple domains of expertise: requirements engineering, business process modeling, IT development etc. Our experience has shown that hierarchical ente...
Irina Rychkova, Alain Wegmann
ISW
2009
Springer
15 years 4 months ago
Nonce Generators and the Nonce Reset Problem
A nonce is a cryptographic input value which must never repeat within a given context. Nonces are important for the security of many cryptographic building blocks, such as stream c...
Erik Zenner
80
Voted
DISCEX
2003
IEEE
15 years 2 months ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
78
Voted
CIKM
1999
Springer
15 years 1 months ago
Rule-Based Query Optimization, Revisited
We present the architecture and a performance assessment of an extensible query optimizer written in Venus. Venus is a general-purpose active-database rule language embedded in C+...
Lane Warshaw, Daniel P. Miranker