Sciweavers

4719 search results - page 238 / 944
» Applications = Components GLoo
Sort
View
TSE
2008
89views more  TSE 2008»
15 years 4 months ago
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. ...
William G. J. Halfond, Alessandro Orso, Pete Manol...
ICDE
2001
IEEE
104views Database» more  ICDE 2001»
16 years 5 months ago
Bundles in Captivity: An Application of Superimposed Information
What do you do to make sense of a mass of information on a given topic? Paradoxically, you likely add yet more information to the pile: annotations, underlining, bookmarks, cross-...
Lois M. L. Delcambre, David Maier, Shawn Bowers, M...
232
Voted
IPC
2007
IEEE
15 years 10 months ago
Design and Validation of a Low-Power Network Node for Pervasive Applications
Pervasive computing refers to making many computing devices available throughout the physical environment, while making them effectively invisible to the user. To further increase...
Juan-Carlos Cano, Carlos Miguel Tavares Calafate, ...
IPPS
2007
IEEE
15 years 10 months ago
Automatic MPI application transformation with ASPhALT
This paper describes a source to source compilation tool for optimizing MPI-based parallel applications. This tool is able to automatically apply a “prepushing” transformation...
Anthony Danalis, Lori L. Pollock, D. Martin Swany
DEXAW
2006
IEEE
129views Database» more  DEXAW 2006»
15 years 10 months ago
Interaction Styles for Service Discovery in Mobile Business Applications
As the power of mobile devices continues to grow, and the range of resources accessible via wireless networks expands, there is an increasing need to offer services to users in a ...
Markus Aleksy, Colin Atkinson, Philipp Bostan, Tho...