Sciweavers

550 search results - page 91 / 110
» The Language of the Visitor Design Pattern
Sort
View
LICS
2006
IEEE
14 years 1 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
ASPLOS
2008
ACM
13 years 10 months ago
Learning from mistakes: a comprehensive study on real world concurrency bug characteristics
The reality of multi-core hardware has made concurrent programs pervasive. Unfortunately, writing correct concurrent programs is difficult. Addressing this challenge requires adva...
Shan Lu, Soyeon Park, Eunsoo Seo, Yuanyuan Zhou
GLVLSI
2002
IEEE
108views VLSI» more  GLVLSI 2002»
14 years 25 days ago
Protected IP-core test generation
Design simplification is becoming necessary to respect the target time-to-market of SoCs, and this goal can be obtained by using predesigned IP-cores. However, their correct inte...
Alessandro Fin, Franco Fummi
ECTEL
2007
Springer
14 years 2 months ago
Role Based Access Control for the Interaction with Search Engines
Search engine-based features are a basic interaction mean for users to find information inside a Web-based Learning Management Systems (LMS); nonetheless, traditional solutions la...
Alessandro Bozzon, Tereza Iofciu, Wolfgang Nejdl, ...
SAC
2010
ACM
14 years 1 months ago
A semantic web-based approach for personalizing news
Hermes is an ontology-based framework for building news personalization services. This framework consists of a news classification phase, which classifies the news, a knowledge ...
Kim Schouten, Philip Ruijgrok, Jethro Borsje, Flav...