Sciweavers

1080 search results - page 177 / 216
» Modeling Constraint Programs with Software Technology Standa...
Sort
View
WWW
2009
ACM
14 years 8 months ago
Using static analysis for Ajax intrusion detection
We present a static control-flow analysis for JavaScript programs running in a web browser. Our analysis tackles numerous challenges posed by modern web applications including asy...
Arjun Guha, Shriram Krishnamurthi, Trevor Jim
WOA
2000
13 years 9 months ago
How a Secure and Open Mobile Agent Framework Suits Electronic Commerce Applications
The Mobile Agent (MA) paradigm seems able to support effectively distributed applications in open and heterogeneous environments, and application areas such as ecommerce appear to...
Paolo Bellavista, Antonio Corradi, Rebecca Montana...
CP
2008
Springer
13 years 8 months ago
Search Strategies for Rectangle Packing
Rectangle (square) packing problems involve packing all squares with sizes 1 × 1 to n × n into the minimum area enclosing rectangle (respectively, square). Rectangle packing is a...
Helmut Simonis, Barry O'Sullivan
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
14 years 2 months ago
Using Agile Practices to Spark Innovation in a Small to Medium Sized Business
The media industry is challenged to find new lines of business as technology redefines content, distribution and customer expectations. This is a case study of Oxygen Media where ...
Ken H. Judy, Ilio Krumins-Beens
IAJIT
2010
162views more  IAJIT 2010»
13 years 6 months ago
Deriving Conceptual Schema from Domain Ontology: A Web Application Reverse Engineering Approach
: The heterogeneous and dynamic nature of components making up a web application, the lack of effective programming mechanisms for implementing basic software engineering principle...
Sidi Mohamed Benslimane, Mimoun Malki, Djelloul Bo...