Sciweavers

811 search results - page 40 / 163
» Refactoring Using Type Constraints
Sort
View
DOCENG
2009
ACM
14 years 3 months ago
On the analysis of queries with counting constraints
We study the analysis problem of XPath expressions with counting constraints. Such expressions are commonly used in document transformations or programs in which they select porti...
Everardo Bárcenas, Pierre Genevès, N...
HOTI
2008
IEEE
14 years 3 months ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani
UM
2010
Springer
14 years 1 months ago
Detecting Gaming the System in Constraint-Based Tutors
Recently, detectors of gaming the system have been developed for several intelligent tutoring systems where the problem-solving process is reified, and gaming consists of systemati...
Ryan S. J. d. Baker, Antonija Mitrovic, Moffat Mat...
ENTCS
2006
120views more  ENTCS 2006»
13 years 8 months ago
Timers for Distributed Systems
We deal with temporal aspects of distributed systems, introducing and studying a new model called timed distributed -calculus. This model extends distributed -calculus with timers...
Gabriel Ciobanu, Cristian Prisacariu
WISE
2009
Springer
14 years 3 months ago
An Integrated Declarative Approach to Web Services Composition and Monitoring
Abstract. In this paper we propose a constraint based declarative approach for Web services composition and monitoring problem. Our apllows user to build the abstract composition b...
Ehtesham Zahoor, Olivier Perrin, Claude Godart