Sciweavers

239 search results - page 42 / 48
» Proof Techniques for Cryptographic Processes
Sort
View
MABS
2004
Springer
14 years 2 months ago
Change Your Tags Fast! - A Necessary Condition for Cooperation?
Since Holland (1993) introduced the concept of tags as a possible cooperation forming mechanism in evolving system (among other things) a number of tag models with intriguing, and ...
David Hales
APSEC
2002
IEEE
14 years 1 months ago
Quality Driven Transformation Compositions for Object Oriented Migration
Reengineering legacy software systems to object oriented platforms has received significant attention over the past few years. In this paper, we propose a goal driven software mig...
Ying Zou, Kostas Kontogiannis
KBSE
1997
IEEE
14 years 26 days ago
NORA/HAMMR: Making Deduction-Based Software Component Retrieval Practical
Deduction-based software component retrieval uses preand postconditions as indexes and search keys and an automated theorem prover (ATP) to check whether a component matches. This...
Johann Schumann, Bernd Fischer 0002
GOSLER
1995
14 years 6 days ago
A Guided Tour Across the Boundaries of Learning Recursive Languages
The present paper deals with the learnability of indexed families of uniformly recursive languages from positive data as well as from both, positive and negative data. We consider...
Thomas Zeugmann, Steffen Lange
ICWS
2003
IEEE
13 years 10 months ago
Semantic Web Enabled Web Services: State-of-Art and Industrial Challenges
Semantic Web technology has a vision to define and link Web data in a way that it can be understood and used by machines for automation, integration and reuse of data across variou...
Vagan Y. Terziyan, Oleksandr Kononenko