Sciweavers

86 search results - page 1 / 18
» Automating ad hoc data representation transformations
Sort
View
DOCENG
2003
ACM
14 years 21 days ago
Context representation, transformation and comparison for ad hoc product data exchange
Product data exchange is the precondition of business interoperation between Web-based firms. However, millions of small and medium sized enterprises (SMEs) encode their Web produ...
Jingzhi Guo, Chengzheng Sun
ESSOS
2009
Springer
14 years 1 days ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
SASN
2003
ACM
14 years 20 days ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
LREC
2010
136views Education» more  LREC 2010»
13 years 9 months ago
LoonyBin: Keeping Language Technologists Sane through Automated Management of Experimental (Hyper)Workflows
Many contemporary language technology systems are characterized by long pipelines of tools with complex dependencies. Too often, these workflows are implemented by ad hoc scripts;...
Jonathan H. Clark, Alon Lavie
DOCENG
2006
ACM
14 years 1 months ago
Mash-o-matic
Mash-ups extract data fragments from disparate sources, and combine and transform the extracted fragments for display. Currently, mash-up developers tend to employ ad hoc represen...
Sudarshan Murthy, David Maier, Lois M. L. Delcambr...