Sciweavers

7475 search results - page 1450 / 1495
» Supporting use case based requirements engineering
Sort
View
ISN
1998
Springer
15 years 7 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
POPL
1995
ACM
15 years 7 months ago
Monad Transformers and Modular Interpreters
We show how a set of building blocks can be used to construct programming language interpreters, and present implementations of such building blocks capable of supporting many com...
Sheng Liang, Paul Hudak, Mark P. Jones
INTERACT
2003
15 years 5 months ago
Error Resolution Strategies for Interactive Television Speech Interfaces
: Using speech input to augment the remote control can be an alternative interaction technique for interactive television. However, little is known about how to design such a syste...
Aseel Berglund, Pernilla Qvarfordt
BMCBI
2007
109views more  BMCBI 2007»
15 years 4 months ago
Computational RNA secondary structure design: empirical complexity and improved methods
Background: We investigate the empirical complexity of the RNA secondary structure design problem, that is, the scaling of the typical difficulty of the design task for various cl...
Rosalía Aguirre-Hernández, Holger H....
JCS
2008
119views more  JCS 2008»
15 years 4 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
« Prev « First page 1450 / 1495 Last » Next »