Sciweavers

35419 search results - page 33 / 7084
» How Are We Doing
Sort
View
ICC
2009
IEEE
122views Communications» more  ICC 2009»
14 years 5 months ago
Sensitive Data Requests: Do Sites Ask Correctly?
— To ensure the security of sensitive Web content, an organization must use TLS and do so correctly. However, little is known about how TLS is actually used on the Web. In this w...
Craig A. Shue, Minaxi Gupta
FMCAD
2000
Springer
14 years 2 months ago
Do You Trust Your Model Checker?
Abstract. In this paper we describe the formal specification and verification of the efficient algorithm for real-time model checking implemented in the model checker RAVEN. It was...
Wolfgang Reif, Jürgen Ruf, Gerhard Schellhorn...
SIGUCCS
2000
ACM
14 years 3 months ago
Manage All the Computer Labs on Campus? What Did I Do to Deserve This?
This paper will discuss how the Information Services Client Services group facilitates the support of campus computer labs. It will discuss how one group consisting of three full-...
Kathy DuBose
PPDP
2001
Springer
14 years 3 months ago
When Do Bounds and Domain Propagation Lead to the Same Search Space?
This paper explores the question of when two propagationbased constraint systems have the same behaviour, in terms of search space. We categorise the behaviour of domain and bound...
Christian Schulte, Peter J. Stuckey
ECSCW
2001
14 years 7 days ago
y do tngrs luv 2 txt msg?
: "Text messaging" -- using a mobile phone to send a message -- has changed how teenagers use wireless phones to communicate and coordinate. While the media reports rapid...
Rebecca E. Grinter, Margery Eldridge