Sciweavers

977 search results - page 106 / 196
» Integrated Environment Management for Information Operations...
Sort
View
ENTCS
2007
139views more  ENTCS 2007»
15 years 4 months ago
A Change-based Approach to Software Evolution
Software evolution research is limited by the amount of information available to researchers: Current version control tools do not store all the information generated by developer...
Romain Robbes, Michele Lanza
AICCSA
2005
IEEE
138views Hardware» more  AICCSA 2005»
15 years 10 months ago
Design, implementation and testing of mobile agent protection mechanism for MANETS
—In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depen...
K. E. A. Negm
SAC
2009
ACM
15 years 11 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
POPL
1999
ACM
15 years 8 months ago
Typed Memory Management in a Calculus of Capabilities
An increasing number of systems rely on programming language technology to ensure safety and security of low-level code. Unfortunately, these systems typically rely on a complex, ...
Karl Crary, David Walker, J. Gregory Morrisett
DEXA
2004
Springer
108views Database» more  DEXA 2004»
15 years 10 months ago
Towards Context-Aware Data Management for Ambient Intelligence
Ambient Intelligence (AmI) is a vision of future Information Society, where people are surrounded by an electronic environment which is sensitive to their needs, personalized to th...
Ling Feng, Peter M. G. Apers, Willem Jonker