Sciweavers

930 search results - page 105 / 186
» Advanced Engineering Informatics
Sort
View
PEPM
2004
ACM
14 years 2 months ago
Proving termination of membership equational programs
Advanced typing, matching, and evaluation strategy features, as well as very general conditional rules, are routinely used in equational programming languages such as, for example...
Francisco Durán, Salvador Lucas, José...
ISPASS
2003
IEEE
14 years 2 months ago
Complete instrumentation requirements for performance analysis of Web based technologies
In this paper we present the eDragon environment, a research platform created to perform complete performance analysis of new Web-based technologies. eDragon enables the understan...
David Carrera, Jordi Guitart, Jordi Torres, Eduard...
ADAEUROPE
2010
Springer
14 years 1 months ago
What to Make of Multicore Processors for Reliable Real-Time Systems?
Now that multicore microprocessors have become a commodity, it is natural to think about employing them in all kinds of computing, including high-reliability embedded real-time sy...
Theodore P. Baker
HAIS
2010
Springer
14 years 1 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
GI
2009
Springer
14 years 1 months ago
Tokenized Interaction Architecture
: Out-of-Home (OOH) advertising is currently advancing into a new era: “pervasive advertising” is one of the buzz words describing a soft change from the traditional push-only ...
Boxian Dong, Bernhard Wally, Alois Ferscha