Sciweavers

2036 search results - page 4 / 408
» Using and Abusing XML
Sort
View
NDSS
2003
IEEE
14 years 1 months ago
Moderately Hard, Memory-Bound Functions
A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. It has been sugge...
Martín Abadi, Michael Burrows, Ted Wobber
PAM
2012
Springer
12 years 3 months ago
Detecting Pedophile Activity in BitTorrent Networks
Abstract. The wide spread of Peer-to-Peer networks makes multimedia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal ...
Moshe Rutgaizer, Yuval Shavitt, Omer Vertman, Noa ...
WWW
2003
ACM
14 years 8 months ago
Making XML Schema Easier to Read and Write
XML Schema is a rather complex schema language, partly because of its inherent complexity, and partly because of its XML syntax. In an effort to reduce the syntactic verboseness a...
Erik Wilde, Kilian Stillhard
SAC
2006
ACM
14 years 1 months ago
Investigating the use of summarisation for interactive XML retrieval
As the number of components in XML documents is much larger than that of ‘flat’ documents, we believe it is essential to provide users of XML information retrieval systems wi...
Zoltán Szlávik, Anastasios Tombros, ...
GI
2004
Springer
14 years 1 months ago
Type Safe Programming of XML-based Applications
: There is an emerging amount of software for generating and manipulating XML documents. This paper addresses the problem of guaranteeing the validity of dynamically generated XML ...
Martin Kempa, Volker Linnemann