Sciweavers

462 search results - page 13 / 93
» Simple Techniques for Complex Web Applications
Sort
View
SEKE
2010
Springer
13 years 6 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
GI
2009
Springer
13 years 5 months ago
A Static Analysis Technique to Detect Unsatisfiable Conditions in Ontology-based Workflows
: Static analysis techniques for consistency checking of workflows allow to avoid runtime errors. This is in particular crucial for long running workflows where errors, detected la...
Gabriele Weiler, Arnd Poetzsch-Heffter, Stephan Ki...
HICSS
2006
IEEE
115views Biometrics» more  HICSS 2006»
14 years 2 months ago
Lookahead Cascade for Table Access on Small Devices
Users increasingly expect access to Web data from a wide range of devices, both wired and wireless. The goal of our research is to inform the design of applications that support d...
Rui Zhang, Carolyn R. Watters, Jack Duffy
SIGSOFT
2009
ACM
14 years 8 months ago
Engineering search computing applications: vision and challenges
Search computing is a novel discipline whose goal is to answer complex, multi-domain queries. Such queries typically require combining in their results domain knowledge extracted ...
Marco Brambilla, Stefano Ceri
ICWS
2007
IEEE
13 years 9 months ago
A Query-based System for Automatic Invocation of Web Services
There is a critical need to design and develop tools tract away the fundamental complexity of XML based Web services specifications and toolkits, and provide an elegant, intuitive...
Chaitali Gupta, Rajdeep Bhowmik, Michael R. Head, ...