Sciweavers

4386 search results - page 814 / 878
» A Tamper-Resistant Programming Language System
Sort
View
CORR
2008
Springer
137views Education» more  CORR 2008»
13 years 10 months ago
Combining generic judgments with recursive definitions
Many semantical aspects of programming languages are specified through calculi for constructing proofs: consider, for example, the specification of structured operational semantic...
Andrew Gacek, Dale Miller, Gopalan Nadathur
IJCSA
2006
95views more  IJCSA 2006»
13 years 10 months ago
Modeling and Formal Verification of DHCP Using SPIN
The Dynamic Host Configuration Protocol (DHCP) is a widely used communication protocol. In this paper, a portion of the protocol is chosen for modeling and verification, namely th...
Syed M. S. Islam, Mohammed H. Sqalli, Sohel Khan
JCM
2008
75views more  JCM 2008»
13 years 10 months ago
A Secure Mobile Agents Platform
Abstract--Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In...
Leila Ismail
CANDC
2004
ACM
13 years 10 months ago
Identification of related gene/protein names based on an HMM of name variations
Gene and protein names follow few, if any, true naming conventions and are subject to great variation in different occurrences of the same name. This gives rise to two important p...
Lana Yeganova, Lawrence H. Smith, W. John Wilbur
COLING
2010
13 years 5 months ago
EMMA: A novel Evaluation Metric for Morphological Analysis
We present a novel Evaluation Metric for Morphological Analysis (EMMA) that is both linguistically appealing and empirically sound. EMMA uses a graphbased assignment algorithm, op...
Sebastian Spiegler, Christian Monson