Sciweavers

2036 search results - page 8 / 408
» Using and Abusing XML
Sort
View
ADL
2000
Springer
225views Digital Library» more  ADL 2000»
14 years 1 months ago
Using Regular Tree Automata as XML Schemas
We address the problem of tight XML schemas and propose regular tree automata to model XML data. We show that the tree automata model is more powerful that the XML DTDs and is clo...
Boris Chidlovskii
ECMAST
1999
Springer
142views Multimedia» more  ECMAST 1999»
14 years 1 months ago
Enabling Flexible Services Using XML Metadata
Combining eXtensible Markup Language (XML) and Active Layer Networking may yield strong benefits for networked services. A Wide range of new Multimedia applications can be develope...
Luis Velasco, Ian Marshall
ADVIS
2006
Springer
14 years 3 months ago
Validation of XML Documents: From UML Models to XML Schemas and XSLT Stylesheets
The widespread use of XML brings out the need of ensuring the validity of XML data. The use of languages such as XML Schema makes easier the process of verification of XML documen...
Eladio Domínguez, Jorge Lloret, Angel Luis ...
ACSAC
2000
IEEE
14 years 1 months ago
Security Against Compelled Disclosure
Various existing and pending legislation can be used to force individuals and organisations to disclose confidential information. Courts may order a wide variety of data to be tu...
Ian Brown, B. Laurie
AAAI
1997
13 years 10 months ago
Smokey: Automatic Recognition of Hostile Messages
Abusive messages (flames) can be both a source of frustration and a waste of time for Internet users. This paper describes some approaches to flame recognition, including a protot...
Ellen Spertus