Sciweavers

645 search results - page 78 / 129
» Non-Monotonic Model Completion in Web Application Engineerin...
Sort
View
WSDM
2009
ACM
178views Data Mining» more  WSDM 2009»
15 years 11 months ago
User Browsing Graph: Structure, Evolution and Application
This paper focuses on ‘user browsing graph’ which is constructed with users’ click-through behavior modeled with Web access logs. User browsing graph has recently been adopt...
Yiqun Liu, Min Zhang, Shaoping Ma, Liyun Ru
ICSE
1999
IEEE-ACM
15 years 8 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
KBSE
2005
IEEE
15 years 10 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
WLP
2000
Springer
15 years 8 months ago
Attempto Controlled English
Attempto Controlled English (ACE) is a controlled natural language, i.e. a precisely defined subset of English that can automatically and unambiguously be translated into first-ord...
Norbert E. Fuchs
WWW
2003
ACM
16 years 5 months ago
Towards a multimedia formatting vocabulary
Time-based, media-centric Web presentations can be described declaratively in the XML world through the development of languages such as SMIL. It is difficult, however, to fully i...
Jacco van Ossenbruggen, Lynda Hardman, Joost Geurt...