Sciweavers

3441 search results - page 679 / 689
» Provenance of Software Development Processes
Sort
View
ACSAC
2001
IEEE
14 years 1 months ago
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions
Vulnerabilities in distributed applications are being uncovered and exploited faster than software engineers can patch the security holes. All too often these weaknesses result fr...
Valentin Razmov, Daniel R. Simon
BIBE
2001
IEEE
14 years 1 months ago
An XML Application For Genomic Data Interoperation
As the eXtensible Markup Language (XML) becomes a popular or standard language for exchanging data over the Internet/Web, there are a growing number of genome Web sites that make ...
Kei-Hoi Cheung, Yang Liu, Anuj Kumar, Michael Snyd...
WWW
2010
ACM
14 years 1 months ago
Enabling entity-based aggregators for web 2.0 data
Selecting and presenting content culled from multiple heterogeneous and physically distributed sources is a challenging task. The exponential growth of the web data in modern time...
Ekaterini Ioannou, Claudia Niederée, Yannis...
CHI
1995
ACM
14 years 1 months ago
The ScienceWare Modeler: a learner-centered tool for students building models
The Modeler is designed using a learner-centered approach [5], with scaffolding to address the specific needs of learners. Scaffolding [3] is an educational term that refers to pro...
Shari L. Jackson
IWMM
2010
Springer
140views Hardware» more  IWMM 2010»
13 years 11 months ago
Parametric inference of memory requirements for garbage collected languages
The accurate prediction of program's memory requirements is a critical component in software development. Existing heap space analyses either do not take deallocation into ac...
Elvira Albert, Samir Genaim, Miguel Gómez-Z...