Sciweavers

2624 search results - page 347 / 525
» The 2LIP model and its implementations
Sort
View
SEKE
2010
Springer
13 years 9 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
SPIN
2010
Springer
13 years 9 months ago
Analysing Mu-Calculus Properties of Pushdown Systems
Pushdown systems provide a natural model of software with recursive procedure calls. We provide a tool implementing an algorithm for computing the winning regions of a pushdown par...
Matthew Hague, C.-H. Luke Ong
TVCG
2010
194views more  TVCG 2010»
13 years 9 months ago
Declarative Language Design for Interactive Visualization
Abstract—We investigate the design of declarative, domain-specific languages for constructing interactive visualizations. By separating specification from execution, declarativ...
Jeffrey Heer, Michael Bostock
APSCC
2010
IEEE
13 years 8 months ago
On Evaluating and Publishing Data Concerns for Data as a Service
Abstract--The proliferation of Data as a Service (DaaS) available on the Internet and offered by cloud service providers indicates an increasing trend in providing data under Web s...
Hong Linh Truong, Schahram Dustdar
BSN
2009
IEEE
189views Sensor Networks» more  BSN 2009»
13 years 8 months ago
Neural Network Gait Classification for On-Body Inertial Sensors
Clinicians have determined that continuous ambulatory monitoring provides significant preventative and diagnostic benefit, especially to the aged population. In this paper we descr...
Mark A. Hanson, Harry C. Powell Jr., Adam T. Barth...