Sciweavers

913 search results - page 60 / 183
» Full Abstraction for Linda
Sort
View
ESORICS
2005
Springer
14 years 2 months ago
On Scalability and Modularisation in the Modelling of Network Security Systems
Abstract. As the use of computers and data communication technologies spreads, network security systems are becoming increasingly complex, due to the incorporation of a variety of ...
João Porto de Albuquerque, Heiko Krumm, Pau...
GRID
2005
Springer
14 years 2 months ago
Differential checkpointing for reducing memory requirements in optimized SOAP deserialization
Abstract— Differential Deserialization (DDS) is a SOAP optimization technique wherein servers save checkpoints and parser states associated with portions of previously received m...
Nayef Abu-Ghazaleh, Michael J. Lewis
ICANN
2005
Springer
14 years 2 months ago
Training of Support Vector Machines with Mahalanobis Kernels
Abstract. Radial basis function (RBF) kernels are widely used for support vector machines. But for model selection, we need to optimize the kernel parameter and the margin paramete...
Shigeo Abe
ICDT
2005
ACM
116views Database» more  ICDT 2005»
14 years 2 months ago
The Design Space of Type Checkers for XML Transformation Languages
Abstract. We survey work on statically type checking XML transformations, covering a wide range of notations and ambitions. The concept of type may vary from idealizations of DTD t...
Anders Møller, Michael I. Schwartzbach
ICLP
2005
Springer
14 years 2 months ago
Small Proof Witnesses for LF
Abstract. We instrument a higher-order logic programming search procedure to generate and check small proof witnesses for the Twelf system, an implementation of the logical framewo...
Susmit Sarkar, Brigitte Pientka, Karl Crary