Sciweavers

1021 search results - page 89 / 205
» Concepts in Proof Planning
Sort
View
ICSM
2005
IEEE
14 years 2 months ago
Ontology-Based Software Analysis and Reengineering Tool Integration: The OASIS Service-Sharing Methodology
A common and difficult maintenance activity is the integration of existing software components or tools into a consistent and interoperable whole. One area in which this has prov...
Dean Jin, James R. Cordy
TIME
2005
IEEE
14 years 2 months ago
A Trace Semantics for Positive Core XPath
— We provide a novel trace semantics for positive core XPath that exposes all intermediate nodes visited by the query engine. This enables a detailed analysis of all information ...
Pieter H. Hartel
COLT
2005
Springer
14 years 2 months ago
The Value of Agreement, a New Boosting Algorithm
We present a new generalization bound where the use of unlabeled examples results in a better ratio between training-set size and the resulting classifier’s quality and thus red...
Boaz Leskes
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
14 years 2 months ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...
ICWE
2005
Springer
14 years 2 months ago
Secure Web Forms with Client-Side Signatures
Abstract. The World Wide Web is evolving from a platform for information access into a platform for interactive services. The interaction of the services is provided by forms. Some...
Mikko Honkala, Petri Vuorimaa