Sciweavers

945 search results - page 86 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
WWW
2005
ACM
16 years 2 months ago
A service creation environment based on end to end composition of Web services
The demand for quickly delivering new applications is increasingly becoming a business imperative today. Application development is often done in an ad hoc manner, without standar...
Vikas Agarwal, Koustuv Dasgupta, Neeran M. Karnik,...
MM
2004
ACM
244views Multimedia» more  MM 2004»
15 years 7 months ago
Automatic replay generation for soccer video broadcasting
While most current approaches for sports video analysis are based on broadcast video, in this paper, we present a novel approach for highlight detection and automatic replay gener...
Jinjun Wang, Changsheng Xu, Chng Eng Siong, Kongwa...
CORR
2010
Springer
134views Education» more  CORR 2010»
15 years 2 months ago
Effective Defect Prevention Approach in Software Process for Achieving Better Quality Levels
Defect prevention is the most vital but habitually neglected facet of software quality assurance in any project. If functional at all stages of software development, it can condens...
V. Suma, T. R. Gopalakrishnan Nair
FIRSTMONDAY
2010
163views more  FIRSTMONDAY 2010»
14 years 11 months ago
Bubbles, gullibility, and other challenges for economics, psychology, sociology, and information sciences
Abstract. Gullibility is the principal cause of bubbles. Investors and the general public get snared by a "beautiful illusion" and throw caution to the wind. Attempts to ...
Andrew M. Odlyzko
ICSE
2008
IEEE-ACM
16 years 2 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su