Sciweavers

1042 search results - page 188 / 209
» Towards Requirements Engineering of Active Database Systems
Sort
View
ICEBE
2005
IEEE
140views Business» more  ICEBE 2005»
14 years 2 months ago
Managing E-Commerce Catalogs in a DBMS with Native XML Support
Electronic commerce is emerging as a major application area for database systems. A large number of e-commerce stores provide electronic product catalogs that allow customers to s...
Lipyeow Lim, Min Wang
EUROSYS
2008
ACM
14 years 6 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
CCS
2009
ACM
14 years 3 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
GI
2009
Springer
14 years 1 months ago
Discovery of Smart Objects in Ubiquitous Environments and the Need for Interaction Metaphors
: In ubiquitous environments computers and smart devices, especially the technical view on them, disappear and users are supported to concentrate on the tasks they actually intend ...
René Reiners
NETGAMES
2006
ACM
14 years 2 months ago
Meeting technology challenges of pervasive augmented reality games
Pervasive games provide a new type of game combining new technologies with the real environment of the players. While this already poses new challenges to the game developer, requ...
Wolfgang Broll, Jan Ohlenburg, Irma Lindt, Iris He...