Sciweavers

6054 search results - page 1077 / 1211
» Implementation of Andorra-based Languages
Sort
View
CCS
2010
ACM
13 years 9 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
ER
2010
Springer
121views Database» more  ER 2010»
13 years 9 months ago
Reasoning with Optional and Preferred Requirements
Abstract. Of particular concern in requirements engineering is the selection of requirements to implement in the next release of a system. To that end, there has been recent work o...
Neil A. Ernst, John Mylopoulos, Alexander Borgida,...
ICFEM
2010
Springer
13 years 9 months ago
A Modular Scheme for Deadlock Prevention in an Object-Oriented Programming Model
Despite the advancements of concurrency theory in the past decades, practical concurrent programming has remained a challenging activity. Fundamental problems such as data races an...
Scott West, Sebastian Nanz, Bertrand Meyer
ICSOC
2010
Springer
13 years 9 months ago
BPEL4Pegasus: Combining Business and Scientific Workflows
Business and scientific workflow management systems (WfMS) offer different features to their users because they are developed for different application areas with different require...
Mirko Sonntag, Dimka Karastoyanova, Ewa Deelman
PVLDB
2008
170views more  PVLDB 2008»
13 years 9 months ago
Data exchange with data-metadata translations
Data exchange is the process of converting an instance of one schema into an instance of a different schema according to a given specification. Recent data exchange systems have l...
Mauricio A. Hernández, Paolo Papotti, Wang ...
« Prev « First page 1077 / 1211 Last » Next »