Sciweavers

682 search results - page 102 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
AIED
2005
Springer
14 years 2 months ago
Making Learning Design Standards Work with an Ontology of Educational Theories
In this paper, we present an ontology of educational theories their relation to learning design. This ontology takes into account learning design (LD) specifications such as OUNL-E...
Valéry Psyché, Jacqueline Bourdeau, ...
MSE
2000
IEEE
165views Hardware» more  MSE 2000»
14 years 1 months ago
JACIE - an Authoring Language for Rapid Prototyping Net-Centric, Multimedia and Collaborative Applications
With continuous acceptance of World Wide Web (WWW) as a de facto standard for human-computer interaction and human-human communication, it is desirable to develop net-centric, mul...
Abdul S. Haji-Ismail, Min Chen, Phil W. Grant, Mar...
SIGSOFT
2008
ACM
14 years 9 months ago
Towards compositional synthesis of evolving systems
Synthesis of system configurations from a given set of features is an important and very challenging problem. This paper makes a step towards this goal by describing an efficient ...
Shiva Nejati, Mehrdad Sabetzadeh, Marsha Chechik, ...
SIGSOFT
2006
ACM
14 years 2 months ago
Memories of bug fixes
The change history of a software project contains a rich collection of code changes that record previous development experience. Changes that fix bugs are especially interesting, ...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
POPL
2006
ACM
14 years 9 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann