Sciweavers

840 search results - page 100 / 168
» XML: From Practice to Theory
Sort
View
KESAMSTA
2009
Springer
14 years 1 months ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial
POPL
2003
ACM
14 years 9 months ago
Guarded recursive datatype constructors
We introduce a notion of guarded recursive (g.r.) datatype constructors, generalizing the notion of recursive datatypes in functional programming languages such as ML and Haskell....
Hongwei Xi, Chiyan Chen, Gang Chen
CHI
2009
ACM
14 years 3 months ago
Butler lies: awareness, deception and design
Instant messaging (IM) is a common and popular way for co-workers, friends, and family to stay in touch, but its “always-on” properties can sometimes lead people to feel overe...
Jeffrey T. Hancock, Jeremy P. Birnholtz, Natalya N...
ISW
2009
Springer
14 years 3 months ago
Nonce Generators and the Nonce Reset Problem
A nonce is a cryptographic input value which must never repeat within a given context. Nonces are important for the security of many cryptographic building blocks, such as stream c...
Erik Zenner
KBSE
2007
IEEE
14 years 3 months ago
Automated detection of api refactorings in libraries
Software developers often do not build software from scratch but reuse software libraries. In theory, the APIs of a library should be stable, but in practice they do change and th...
Kunal Taneja, Danny Dig, Tao Xie