Sciweavers

3573 search results - page 639 / 715
» Reasoning about Codata
Sort
View
WETICE
2003
IEEE
14 years 4 months ago
Attack-Resistance of Computational Trust Models
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a fr...
Andrew Twigg, Nathan Dimmock
HT
2003
ACM
14 years 4 months ago
Simplifying annotation support for real-world-settings: a comparative study of active reading
Despite the multitude of existing interfaces for annotation, little is known about their influence on the created annotations. In this paper, first findings of a comparative video...
Hartmut Obendorf
IMC
2003
ACM
14 years 4 months ago
On inferring and characterizing internet routing policies
Border Gateway Protocol allows Autonomous Systems (ASs) to apply diverse routing policies for selecting routes and for propagating reachability information to other ASs. Although ...
Feng Wang, Lixin Gao
ITICSE
2003
ACM
14 years 4 months ago
Studying program correctness by constructing contracts
Because the concept of program correctness is generally taught as an activity independent of the programming process, most introductory computer science (CS) students perceive it ...
Timothy S. Gegg-Harrison, Gary R. Bunce, Rebecca D...
PLDI
2003
ACM
14 years 4 months ago
Checking and inferring local non-aliasing
In prior work [15] we studied a language construct restrict that allows programmers to specify that certain pointers are not aliased to other pointers used within a lexical scope....
Alexander Aiken, Jeffrey S. Foster, John Kodumal, ...