Sciweavers

1216 search results - page 205 / 244
» Hybrid type checking
Sort
View
TSE
2008
236views more  TSE 2008»
13 years 8 months ago
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies
Web applications are widely adopted and their correct functioning is mission critical for many businesses. At the same time, Web applications tend to be error prone and implementat...
Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Fr...
MJ
2007
119views more  MJ 2007»
13 years 8 months ago
Automated energy calculation and estimation for delay-insensitive digital circuits
With increasingly smaller feature sizes and higher on-chip densities, the power dissipation of VLSI systems has become a primary concern for designers. This paper first describes...
Venkat Satagopan, Bonita Bhaskaran, Anshul Singh, ...
ICIP
2000
IEEE
14 years 10 months ago
Copyright Labeling of Printed Images
Digital Watermarking is a labeling technique for digital images which embeds a code into the digital data so the data is marked. Watermarking techniques previously developed deal ...
Hagit Zabrodsky Hel-Or
ICDE
2008
IEEE
139views Database» more  ICDE 2008»
14 years 10 months ago
Simultaneous Equation Systems for Query Processing on Continuous-Time Data Streams
We introduce Pulse, a framework for processing continuous queries over models of continuous-time data, which can compactly and accurately represent many real-world activities and p...
Jennie Rogers, Olga Papaemmanouil, Ugur Çet...
GIS
2005
ACM
14 years 9 months ago
Dimension-refined topological predicates
Topological predicates, as derived from the 9-intersection model, have been widely recognized in GIS, spatial database systems, and many other geo-related disciplines. They are ba...
Mark McKenney, Alejandro Pauly, Reasey Praing, Mar...