Sciweavers

3104 search results - page 605 / 621
» Competence-Based EE-Learning: (How) Can We Implement It
Sort
View
CCS
2008
ACM
15 years 6 months ago
Verifiable functional purity in java
Proving that particular methods within a code base are functionally pure--deterministic and side-effect free--would aid verification of security properties including function inve...
Matthew Finifter, Adrian Mettler, Naveen Sastry, D...
CCS
2008
ACM
15 years 6 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ACMICEC
2008
ACM
240views ECommerce» more  ACMICEC 2008»
15 years 6 months ago
Document-oriented heterogeneous business process integration through collaborative e-marketplace
In this paper, we studied the semantic consistency maintenance issue between heterogeneous contexts, that is, how a firm business process of one e-marketplace can be transformed t...
Jingzhi Guo, Zhuo Hu, Chi-Kit Chan, Yufeng Luo, Ch...
FLAIRS
2004
15 years 5 months ago
Satisfying Varying Retrieval Requirements in Case Based Intelligent Directory Assistance
Intelligent directory assistance is the ability to retrieve relevant subscriber records in the presence of mismatches between the query and the subscriber record. The challenges a...
Vivek Balaraman, Sutanu Chakraborti
IM
2003
15 years 5 months ago
Facilitating Efficient and Reliable Monitoring through HAMSA
: Monitoring is a fundamental building block of any network management system. It is needed to ensure that the network operates within the required parameters, and to account for u...
David Breitgand, Danny Dolev, Danny Raz, Gleb Shav...