Sciweavers

3086 search results - page 418 / 618
» Developing Secure Web Applications
Sort
View
EGOV
2005
Springer
15 years 7 months ago
Monitoring and Updating Regulations and Policies for Government Services
One of the challenges citizens and businesses face in interacting with governments for entitled services or compliance services is to find the right set of regulations and rules th...
Soon Ae Chun, Edwin Portscher, James Geller
WWW
2011
ACM
14 years 9 months ago
Towards liquid service oriented architectures
The advent of Cloud computing platforms, and the growing pervasiveness of Multicore processor architectures have revealed the inadequateness of traditional programming models base...
Daniele Bonetta, Cesare Pautasso
SAC
2005
ACM
15 years 8 months ago
Automatic learning of text-to-concept mappings exploiting WordNet-like lexical networks
A great jump towards the advent of the Semantic Web will take place when a critical mass of web resources is available for use in a semantic way. This goal can be reached by the c...
Dario Bonino, Fulvio Corno, Federico Pescarmona
EUROSPI
2005
Springer
15 years 7 months ago
Safety Methods in Software Process Improvement
Even if the application developers produce software in accordance with the customer requirements, they cannot guarantee that the software will behave in a safe way during the lifet...
Torgrim Lauritsen, Tor Stålhane
OOPSLA
2005
Springer
15 years 7 months ago
Using predicate fields in a highly flexible industrial control system
Predicate fields allow an object’s structure to vary at runtime based on the object’s state: a predicate field is present or not, depending on the values of other fields. P...
Shay Artzi, Michael D. Ernst