Sciweavers

3086 search results - page 508 / 618
» Developing Secure Web Applications
Sort
View
FM
2005
Springer
98views Formal Methods» more  FM 2005»
14 years 2 months ago
Retrenching the Purse: Finite Sequence Numbers, and the Tower Pattern
The Mondex Electronic Purse system [18] is an outstanding example of formal refinement techniques applied to a genuine industrial scale application, and notably, was the first ve...
Richard Banach, Michael Poppleton, Czeslaw Jeske, ...
BMCBI
2007
217views more  BMCBI 2007»
13 years 9 months ago
OntologyWidget - a reusable, embeddable widget for easily locating ontology terms
Background: Biomedical ontologies are being widely used to annotate biological data in a computer-accessible, consistent and well-defined manner. However, due to their size and co...
Catherine Beauheim, Farrell Wymore, Michael Nitzbe...
ISI
2008
Springer
13 years 9 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
ER
2005
Springer
200views Database» more  ER 2005»
14 years 2 months ago
How to Tame a Very Large ER Diagram (Using Link Analysis and Force-Directed Drawing Algorithms)
Abstract. Understanding a large schema without the assistance of persons already familiar with it (and its associated applications), is a hard and very time consuming task that occ...
Yannis Tzitzikas, Jean-Luc Hainaut
BTW
2005
Springer
112views Database» more  BTW 2005»
14 years 2 months ago
Valid Updates for Persistent XML Objects
: XML has emerged as the industry standard for representing and exchanging data and is already predominant in several applications today. Business, analytic and structered data wil...
Henrike Schuhart, Volker Linnemann