Sciweavers

SAC
2010
ACM
13 years 11 months ago
A robust link-translating proxy server mirroring the whole web
Link-translating proxies are widely used for anonymous browsing, policy circumvention and WebVPN functions. These are implemented by encoding the destination URL in the path of th...
Ziqing Mao, Cormac Herley
SAC
2010
ACM
13 years 11 months ago
The semantics of personalised web accessibility assessment
This paper presents SAAF, a Semantic Accessibility Assessment Framework for personalised Web accessibility assessment procedures. We define four domains as a way to decouple gene...
Rui Lopes, Konstantinos Votis, Luís Carri&c...
SAC
2010
ACM
13 years 11 months ago
Towards the induction of terminological decision trees
A concept learning framework for terminological representations is introduced. It is grounded on a method for inducing logic decision trees as an adaptation of the classic tree in...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito
SAC
2010
ACM
13 years 11 months ago
Extraction of component-environment interaction model using state space traversal
Scalability of software engineering methods can be improved by application of the methods to individual components instead of complete systems. This is, however, possible only if ...
Pavel Parizek, Nodir Yuldashev
SAC
2010
ACM
13 years 11 months ago
Constraint-based LN-curves
We consider the design of parametric curves from geometric constraints such as distance from lines or points and tangency to lines or circles. We solve the Hermite problem with su...
Young Joon Ahn, Christoph M. Hoffmann
SAC
2010
ACM
13 years 11 months ago
Dynamic optimization of power and performance for virtualized server clusters
In this paper we present an optimization solution for power and performance management in a platform running multiple independent applications. Our approach assumes a virtualized ...
Vinicius Petrucci, Orlando Loques, Daniel Moss&eac...
SAC
2010
ACM
13 years 11 months ago
Recovering uncertain mappings through structural validation and aggregation with the MoTo system
We present an automated ontology matching methodology, supported by various machine learning techniques, as implemented in the system MoTo. The methodology is twotiered. On the ...
Floriana Esposito, Nicola Fanizzi, Claudia d'Amato
SAC
2010
ACM
13 years 11 months ago
Variable ranges in linear constraints
We introduce an extension of linear constraints, called linearrange constraints, which allows for (meta-)reasoning about the approximation width of variables. Semantics for linear...
Salvatore Ruggieri, Fred Mesnard
SAC
2010
ACM
13 years 11 months ago
A tool for rapid development of WS-BPEL applications
Luca Cesari, Alessandro Lapadula, Rosario Pugliese...
SAC
2010
ACM
13 years 11 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...