Sciweavers

4126 search results - page 784 / 826
» Relationships with other Formalisms
Sort
View
W4A
2005
ACM
14 years 1 months ago
Designing learning systems to provide accessible services
The need for providing learners with web-based learning content that match their accessibility needs and preferences, as well as providing ways to match learning content to userā€...
Pythagoras Karampiperis, Demetrios G. Sampson
WIDM
2005
ACM
14 years 1 months ago
Exploiting native XML indexing techniques for XML retrieval in relational database systems
In XML retrieval, two distinct approaches have been established and pursued without much cross-fertilization taking place so far. On the one hand, native XML databases tailored to...
Felix Weigel, Klaus U. Schulz, Holger Meuss
ADBIS
2005
Springer
147views Database» more  ADBIS 2005»
14 years 1 months ago
Declarative Data Fusion - Syntax, Semantics, and Implementation
In todayā€™s integrating information systems data fusion, i.e., the merging of multiple tuples about the same real-world object into a single tuple, is left to ETL tools and other ...
Jens Bleiholder, Felix Naumann
CAV
2005
Springer
173views Hardware» more  CAV 2005»
14 years 1 months ago
Building Your Own Software Model Checker Using the Bogor Extensible Model Checking Framework
Model checking has proven to be an eļ¬€ective technology for veriļ¬cation and debugging in hardware and more recently in software domains. We believe that recent trends in both th...
Matthew B. Dwyer, John Hatcliff, Matthew Hoosier, ...
CCS
2005
ACM
14 years 1 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin