Sciweavers

449 search results - page 80 / 90
» Model Checking Large Software Specifications
Sort
View
73
Voted
KBSE
2005
IEEE
15 years 3 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
POPL
2009
ACM
15 years 10 months ago
The semantics of progress in lock-based transactional memory
Transactional memory (TM) is a promising paradigm for concurrent programming. Whereas the number of TM implementations is growing, however, little research has been conducted to p...
Rachid Guerraoui, Michal Kapalka
100
Voted
ESCIENCE
2006
IEEE
15 years 1 months ago
ODIN: A Model for Adapting and Enriching Legacy Infrastructure
The Online Database of Interlinear Text (ODIN)1 is a database of interlinear text "snippets", harvested mostly from scholarly documents posted to the Web. Although large...
William D. Lewis
83
Voted
CORR
2008
Springer
144views Education» more  CORR 2008»
14 years 9 months ago
Modular Compilation of a Synchronous Language
Synchronous languages rely on formal methods to ease the development of applications in an efficient and reusable way. Formal methods have been advocated as a means of increasing t...
Annie Ressouche, Daniel Gaffé, Valér...
BMCBI
2006
153views more  BMCBI 2006»
14 years 9 months ago
2DDB - a bioinformatics solution for analysis of quantitative proteomics data
Background: We present 2DDB, a bioinformatics solution for storage, integration and analysis of quantitative proteomics data. As the data complexity and the rate with which it is ...
Lars Malmström, György Marko-Varga, Guni...