Sciweavers

7918 search results - page 1198 / 1584
» Model Composition Directives
Sort
View
ACMSE
2006
ACM
15 years 10 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
AOSD
2006
ACM
15 years 10 months ago
A join point for loops in AspectJ
The current AspectJ join points represent locations in the code that are at the interface of the Java objects. However, not all the “things that happen”1 happen at the interfa...
Bruno Harbulot, John R. Gurd
ISSTA
2006
ACM
15 years 10 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
MSWIM
2006
ACM
15 years 10 months ago
Performance evaluation of web services invocation over Bluetooth
Mobile devices should allow users to exploit services anytime, without any place restriction and in a transparent way. The Bluetooth technology achieves this feature, by providing...
Vincenzo Auletta, Carlo Blundo, Emiliano De Cristo...
SMA
2006
ACM
136views Solid Modeling» more  SMA 2006»
15 years 10 months ago
Controlled-topology filtering
Many applications require the extraction of isolines and isosurfaces from scalar functions defined on regular grids. These scalar functions may have many different origins: from ...
Yotam I. Gingold, Denis Zorin
« Prev « First page 1198 / 1584 Last » Next »