Sciweavers

4311 search results - page 655 / 863
» Code Generation for Distributed Systems
Sort
View
111
Voted
WWW
2009
ACM
16 years 1 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
111
Voted
XIMEP
2004
ACM
108views Database» more  XIMEP 2004»
15 years 5 months ago
The Joy of SAX
Most current XQuery implementations require that all XML data reside in memory in one form or another before they start processing the data. This is unacceptable for large XML doc...
Leonidas Fegaras
116
Voted
BIOINFORMATICS
2011
14 years 7 months ago
Inverse perturbation for optimal intervention in gene regulatory networks
Motivation: Analysis and intervention in the dynamics of gene regulatory networks is at the heart of emerging efforts in the development of modern treatment of numerous ailments i...
Nidhal Bouaynaya, Roman Shterenberg, Dan Schonfeld
104
Voted
SENSYS
2009
ACM
15 years 7 months ago
Run time assurance of application-level requirements in wireless sensor networks
Continuous and reliable operation of WSNs is notoriously difficult to guarantee due to hardware degradation and environmental changes. In this paper, we propose and demonstrate a ...
Jingyuan Li, Yafeng Wu, Krasimira Kapitanova, John...
110
Voted
GECCO
2006
Springer
162views Optimization» more  GECCO 2006»
15 years 4 months ago
Improving evolutionary real-time testing
Embedded systems are often used in a safety-critical context, e.g. in airborne or vehicle systems. Typically, timing constraints must be satisfied so that real-time embedded syste...
Marouane Tlili, Stefan Wappler, Harmen Sthamer