Sciweavers

263 search results - page 45 / 53
» Modeling the Structure of Web Applications with ArgoUWE
Sort
View
APLAS
2010
ACM
13 years 8 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
IPPS
1999
IEEE
14 years 26 days ago
An Adaptive, Fault-Tolerant Implementation of BSP for JAVA-Based Volunteer Computing Systems
Abstract. In recent years, there has been a surge of interest in Javabased volunteer computing systems, which aim to make it possible to build very large parallel computing network...
Luis F. G. Sarmenta
ICASSP
2010
IEEE
13 years 8 months ago
Distributed learning in cognitive radio networks: Multi-armed bandit with distributed multiple players
—We consider a cognitive radio network with distributed multiple secondary users, where each user independently searches for spectrum opportunities in multiple channels without e...
Keqin Liu, Qing Zhao
ERCIMDL
2004
Springer
180views Education» more  ERCIMDL 2004»
14 years 1 months ago
Next Generation Search Interfaces - Interactive Data Exploration and Hypothesis Formulation
To date, the majority of Web search engines have provided simple keyword search interfaces that present the results as a ranked list of hyperlinks. More recently researchers have b...
Jane Hunter, Katya Falkovych, Suzanne Little
OTM
2004
Springer
14 years 1 months ago
Domain Ontology as a Resource Providing Adaptivity in eLearning
Abstract. This paper presents a knowledge-based approach to eLearning, where the domain ontology plays central role as a resource structuring the learning content and supporting ï¬...
Galia Angelova, Ognian Kalaydjiev, Albena Strupcha...