Sciweavers

7080 search results - page 1244 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
118
Voted
PERCOM
2007
ACM
16 years 3 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...
124
Voted
SLE
2009
Springer
15 years 10 months ago
A Role-Based Approach towards Modular Language Engineering
Modularisation can reduce the effort in designing and maintaining language specifications. Existing approaches to language modularisation are typically either focused on language ...
Christian Wende, Nils Thieme, Steffen Zschaler
123
Voted
SSDBM
2008
IEEE
90views Database» more  SSDBM 2008»
15 years 9 months ago
Ontology Database: A New Method for Semantic Modeling and an Application to Brainwave Data
We propose an automatic method for modeling a relational database that uses SQL triggers and foreign-keys to efficiently answer positive semantic queries about ground instances for...
Paea LePendu, Dejing Dou, Gwen A. Frishkoff, Jiawe...
128
Voted
ADAEUROPE
2007
Springer
15 years 9 months ago
Towards User-Level Extensibility of an Ada Library: An Experiment with Cheddar
In this article, we experiment a way to extend an Ada library called Cheddar. Cheddar provides a domain specific language. Programs written with this domain specific language can...
Frank Singhoff, Alain Plantec
118
Voted
ESORICS
2007
Springer
15 years 9 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
« Prev « First page 1244 / 1416 Last » Next »