Sciweavers

2237 search results - page 300 / 448
» Storing information with extractors
Sort
View
ICSEA
2008
IEEE
14 years 5 months ago
Reuse through Requirements Traceability
The Reuse of code artefacts can make development quicker, cheaper and more robust, but the process is complex and has many pitfalls: Code artefacts must exist, be available, be fo...
Rob Pooley, Craig Warren
IEEEARES
2008
IEEE
14 years 5 months ago
A Post-processing Method to Lessen k-Anonymity Dissimilarities
Protecting personal data is essential to guarantee the rule of law1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can b...
Agusti Solanas, Gloria Pujol, Antoni Martín...
IEEEARES
2008
IEEE
14 years 5 months ago
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
Mehdi Kiani, Andrew Clark, George M. Mohay
SASO
2008
IEEE
14 years 5 months ago
Bioinspired Environmental Coordination in Spatial Computing Systems
—Spatial computing systems are characterized by the extended physical environment in which they exist and function. Often this environment can be manipulated in various ways by t...
Justin Werfel, Yaneer Bar-Yam, Donald E. Ingber
TIME
2008
IEEE
14 years 5 months ago
Representing Public Transport Schedules as Repeating Trips
The movement in public transport networks is organized according to schedules. The real-world schedules are specified by a set of periodic rules and a number of irregularities fr...
Romans Kasperovics, Michael H. Böhlen, Johann...