Sciweavers

503 search results - page 76 / 101
» Authenticity by tagging and typing
Sort
View
WWW
2007
ACM
14 years 8 months ago
Visibly pushdown automata for streaming XML
We propose the study of visibly pushdown automata (Vpa) for processing XML documents. Vpas are pushdown automata where the input determines the stack operation, and XML documents ...
Viraj Kumar, P. Madhusudan, Mahesh Viswanathan
WWW
2009
ACM
14 years 2 months ago
Social search and discovery using a unified approach
: This talk describes a research project exploring new ways for augmenting search using multiple types and sources of social information. Our goal is to allow searching for all obj...
Einat Amitay, David Carmel, Nadav Har'El, Shila Of...
TREC
2003
13 years 9 months ago
Overview of the TREC 2003 Question Answering Track
The TREC 2003 question answering track contained two tasks, the passages task and the main task. In the passages task, systems returned a single text snippet in response to factoi...
Ellen M. Voorhees
EUROCRYPT
1995
Springer
13 years 11 months ago
Quantum Oblivious Mutual Identification
We coiisider a situation where two parties, Alice and Bob, share a common secret string arid would like to mutually check their knowledge of that string. We describe a simple and e...
Claude Crépeau, Louis Salvail
APLAS
2010
ACM
13 years 7 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...