Sciweavers

325 search results - page 62 / 65
» Rewriting Strategies in Java
Sort
View
TEC
2002
166views more  TEC 2002»
13 years 6 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 4 months ago
MT4j - A Cross-platform Multi-touch Development Framework
This article describes requirements and challenges of crossplatform multi-touch software engineering, and presents the open source framework Multi-Touch for Java (MT4j) as a solut...
Uwe Laufs, Christopher Ruff, Jan Zibuschka
WWW
2008
ACM
14 years 7 months ago
Utility-driven load shedding for xml stream processing
Because of the high volume and unpredictable arrival rate, stream processing systems may not always be able to keep up with the input data streams-- resulting in buffer overflow a...
Mingzhu Wei, Elke A. Rundensteiner, Murali Mani
WWW
2004
ACM
14 years 7 months ago
Managing versions of web documents in a transaction-time web server
This paper presents a transaction-time HTTP server, called ? Apache that supports document versioning. A document often consists of a main file formatted in HTML or XML and severa...
Curtis E. Dyreson, Hui-ling Lin, Yingxia Wang
SIGMOD
2009
ACM
201views Database» more  SIGMOD 2009»
14 years 7 months ago
Cost based plan selection for xpath
We present a complete XPath cost-based optimization and execution framework and demonstrate its effectiveness and efficiency for a variety of queries and datasets. The framework i...
Haris Georgiadis, Minas Charalambides, Vasilis Vas...