Sciweavers

8493 search results - page 1548 / 1699
» Implementing a distributed firewall
Sort
View
116
Voted
SIGSOFT
2003
ACM
16 years 4 months ago
Regression testing of GUIs
Although graphical user interfaces (GUIs) constitute a large part of the software being developed today and are typically created using rapid prototyping, there are no effective r...
Atif M. Memon, Mary Lou Soffa
166
Voted
SIGSOFT
2003
ACM
16 years 4 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
124
Voted
WWW
2009
ACM
16 years 4 months ago
XQuery in the browser
Since the invention of the Web, the browser has become more and more powerful. By now, it is a programming and execution environment in itself. The predominant language to program...
Ghislain Fourny, Markus Pilman, Daniela Florescu, ...
131
Voted
WWW
2009
ACM
16 years 4 months ago
Triplify: light-weight linked data publication from relational databases
In this paper we present Triplify ? a simplistic but effective approach to publish Linked Data from relational databases. Triplify is based on mapping HTTP-URI requests onto relat...
Sören Auer, Sebastian Dietzold, Jens Lehmann,...
143
Voted
WWW
2009
ACM
16 years 4 months ago
Bid optimization for broad match ad auctions
Ad auctions in sponsored search support"broad match"that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving mo...
Eyal Even-Dar, Vahab S. Mirrokni, S. Muthukrishnan...
« Prev « First page 1548 / 1699 Last » Next »