Sciweavers

45 search results - page 7 / 9
» Finding Function Clones in Web Applications
Sort
View
VLDB
1998
ACM
105views Database» more  VLDB 1998»
13 years 11 months ago
Computing Iceberg Queries Efficiently
Many applications compute aggregate functions over an attribute (or set of attributes) to find aggregate values above some specified threshold. We call such queries iceberg querie...
Min Fang, Narayanan Shivakumar, Hector Garcia-Moli...
PADL
2009
Springer
14 years 8 months ago
Declarative Programming of User Interfaces
This paper proposes a declarative description of user interfaces that s from low-level implementation details. In particular, the user interfaces specified in our framework are exe...
Christof Kluß, Michael Hanus
HOTNETS
2010
13 years 2 months ago
HTTP as the narrow waist of the future internet
Over the past decade a variety of network architectures have been proposed to address IP's limitations in terms of flexible forwarding, security, and data distribution. Meanw...
Lucian Popa 0002, Ali Ghodsi, Ion Stoica
ICSE
2008
IEEE-ACM
14 years 7 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
GIS
1999
ACM
13 years 11 months ago
Integrating Geographic Information Systems, Spatial Digital Libraries and Information Spaces for Conducting Humanitarian Assista
The GeoWorlds system integrates geographic information systems, spatial digital libraries and other information analysis, retrieval and collaboration tools. It supports multiple a...
Vished Kumar, Alejandro Bugacov, Murilo Coutinho, ...