Sciweavers

1061 search results - page 131 / 213
» Integrity Constraints for Linked Data
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
WSE
2003
IEEE
14 years 3 months ago
Considering Browser Interaction in Web Application Testing
As web applications evolves, their structure may become more and more complex. Thus, systematic approaches/methods for web application testing are needed. Existing methods take in...
Giuseppe A. Di Lucca, Massimiliano Di Penta
CHI
1999
ACM
14 years 2 months ago
Augmented Surfaces: A Spatially Continuous Work Space for Hybrid Computing Environments
Thispaper describes our design and implementation of a computer augmented environment that allows users to smoothly interchange digital information among their portable computers,...
Jun Rekimoto, Masanori Saitoh
VISUALIZATION
1995
IEEE
14 years 1 months ago
Iconic Techniques for Feature Visualization
This paper presents a conceptual framework and a process model for feature extraction and iconic visualization. Fearaction is viewed as a process of data abstraction, which can pr...
Frank J. Post, Theo van Walsum, Frits H. Post, Deb...
COLING
2010
13 years 5 months ago
LTP: A Chinese Language Technology Platform
LTP (Language Technology Platform) is an integrated Chinese processing platform which includes a suite of high performance natural language processing (NLP) modules and relevant c...
Wanxiang Che, Zhenghua Li, Ting Liu