Sciweavers

2018 search results - page 389 / 404
» Code Normal Forms
Sort
View
OOPSLA
2007
Springer
14 years 2 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
ASWEC
2006
IEEE
14 years 2 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
ICMCS
2006
IEEE
159views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Image Vector Quantization Indices Recovery using Lagrange Interpolation
Vector quantization (VQ) is an efficient coding algorithm due to its fast decoding efficiency. Indices of VQ will be lost during the transmission because of the signal interferenc...
Yung-Gi Wu, Chia-Hao Wu
WSE
2006
IEEE
14 years 2 months ago
Modeling Request Routing in Web Applications
For web applications, determining how requests from a web page are routed through server components can be time-consuming and error-prone due to the complex set of rules and mecha...
Minmin Han, Christine Hofmeister
VALUETOOLS
2006
ACM
167views Hardware» more  VALUETOOLS 2006»
14 years 2 months ago
Detailed cache simulation for detecting bottleneck, miss reason and optimization potentialities
Cache locality optimization is an efficient way for reducing the idle time of modern processors in waiting for needed data. This kind of optimization can be achieved either on the...
Jie Tao, Wolfgang Karl