Sciweavers

1777 search results - page 217 / 356
» Programming Cryptographic Protocols
Sort
View
ILP
2007
Springer
14 years 3 months ago
Applying Inductive Logic Programming to Process Mining
The management of business processes has recently received a lot of attention. One of the most interesting problems is the description of a process model in a language that allows ...
Evelina Lamma, Paola Mello, Fabrizio Riguzzi, Serg...
USENIX
2003
13 years 10 months ago
Network Programming for the Rest of Us
Twisted is a high-level networking framework that is built around event-driven asynchronous I/O. It supports TCP, SSL, UDP and other network transports. Twisted supports a wide va...
Glyph Lefkowitz, Itamar Shtull-Trauring
JAMIA
2010
76views more  JAMIA 2010»
13 years 3 months ago
The inadvertent disclosure of personal health information through peer-to-peer file sharing programs
Objective There has been a consistent concern about the inadvertent disclosure of personal information through peer-to-peer file sharing applications, such as Limewire and Morpheu...
Khaled El Emam, Emilio Neri, Elizabeth Jonker, Mar...
SAC
2006
ACM
14 years 2 months ago
Decoupling classes with inferred interfaces
Using small, context-specific interfaces in variable declarations serves the decoupling of classes and increases a program’s flexibility. To minimize its interface, a thorough a...
Friedrich Steimann, Philip Mayer, Andreas Meissner
POPL
2002
ACM
14 years 9 months ago
Mining specifications
Program verification is a promising approach to improving program quality, because it can search all possible program executions for specific errors. However, the need to formally...
Glenn Ammons, James R. Larus, Rastislav Bodí...