Sciweavers

31686 search results - page 230 / 6338
» Resource typing in Guru
Sort
View
CSFW
2000
IEEE
14 years 2 months ago
How to Prevent Type Flaw Attacks on Security Protocols
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number o...
James Heather, Gavin Lowe, Steve Schneider
DBPL
1987
Springer
113views Database» more  DBPL 1987»
14 years 1 months ago
Orderings and Types in Databases
This paper investigates a method to represent database objects as typed expressions in programming languages. A simple typed language supporting non-flat records, higher-order rel...
Atsushi Ohori
ESOP
2008
Springer
14 years 5 days ago
A Realizability Model for Impredicative Hoare Type Theory
We present a denotational model of impredicative Hoare Type Theory, a very expressive dependent type theory in which one can and reason about mutable abstract data types. The model...
Rasmus Lerchedahl Petersen, Lars Birkedal, Aleksan...
BCSHCI
2008
13 years 12 months ago
MECE method for categorising typing errors
This research aims to create an MECE (Mutually Exclusive, Collectively Exhaustive) categorisation method for typing errors. The research is grounded in theory by gathering typing ...
Akiyo Kano
IEEECGIV
2009
IEEE
14 years 5 months ago
Thai Font Type Recognition Using Linear Interpolation Analysis
A new approach to Thai font type recognition that is presented in this paper is based on linear interpolation analysis of the character contour. The algorithm can perform effectiv...
Pitchaya Jamjuntr, Natasha Dejdumrong