Sciweavers

1629 search results - page 169 / 326
» A Study of Malcode-Bearing Documents
Sort
View
QSIC
2007
IEEE
14 years 3 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao
B
2007
Springer
14 years 3 months ago
Time Constraint Patterns for Event B Development
Distributed applications are based on algorithms which should be able to deal with time constraints. It is mandatory to express time constraints in (mathematical) models and the cu...
Dominique Cansell, Dominique Méry, Joris Re...
ERCIMDL
2007
Springer
129views Education» more  ERCIMDL 2007»
14 years 3 months ago
Know Thy Sensor: Trust, Data Quality, and Data Integrity in Scientific Digital Libraries
For users to trust and interpret the data in scientific digital libraries, they must be able to assess the integrity of those data. Criteria for data integrity vary by context, by ...
Jillian C. Wallis, Christine L. Borgman, Matthew S...
FSTTCS
2007
Springer
14 years 3 months ago
A Formal Investigation of
The diff3 algorithm is widely considered the gold standard for merging uncoordinated changes to list-structured data such as text files. Surprisingly, its fundamental properties h...
Sanjeev Khanna, Keshav Kunal, Benjamin C. Pierce
SEMWEB
2007
Springer
14 years 3 months ago
Mutual Contextualization in Tripartite Graphs of Folksonomies
The use of tags to describe Web resources in a collaborative manner has experienced rising popularity among Web users in recent years. The product of such activity is given the nam...
Ching-man Au Yeung, Nicholas Gibbins, Nigel Shadbo...