Sciweavers

540 search results - page 102 / 108
» Exploiting the Combined Potential of Web Applications and We...
Sort
View
HPDC
2008
IEEE
14 years 2 months ago
XenLoop: a transparent high performance inter-vm network loopback
Advances in virtualization technology have focused mainly on strengthening the isolation barrier between virtual machines (VMs) that are co-resident within a single physical machi...
Jian Wang, Kwame-Lante Wright, Kartik Gopalan
TACAS
2005
Springer
113views Algorithms» more  TACAS 2005»
14 years 1 months ago
jETI: A Tool for Remote Tool Integration
Abstract. We present jETI, a redesign of the Electronic Tools Integration platform (ETI), that addresses the major issues and concerns accumulated over seven years of experience wi...
Tiziana Margaria, Ralf Nagel, Bernhard Steffen
CHI
2009
ACM
14 years 8 months ago
Amplifying community content creation with mixed initiative information extraction
Although existing work has explored both information extraction and community content creation, most research has focused on them in isolation. In contrast, we see the greatest le...
Raphael Hoffmann, Saleema Amershi, Kayur Patel, Fe...
SWAP
2007
13 years 8 months ago
UFOme: A User Friendly Ontology Mapping Environment
Recently the Ontology Mapping Problem (OMP) has been identified as a key factor towards the success of the Semantic Web and related applications. This problem arises since it is po...
Giuseppe Pirrò, Domenico Talia
RAID
2005
Springer
14 years 1 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe