Sciweavers

7690 search results - page 1515 / 1538
» On the semantics of informational independence
Sort
View
SEMWEB
2007
Springer
15 years 8 months ago
Using the AgreementMaker to Align Ontologies for the OAEI Campaign 2007
In this paper, we present the AgreementMaker, an ontology alignment tool that incorporates the Descendants Similarity Inheritance (DSI) method. This method uses the structure of th...
William Sunna, Isabel F. Cruz
ASWEC
2006
IEEE
15 years 7 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
IEEEPACT
2006
IEEE
15 years 7 months ago
Hardware support for spin management in overcommitted virtual machines
Multiprocessor operating systems (OSs) pose several unique and conflicting challenges to System Virtual Machines (System VMs). For example, most existing system VMs resort to gan...
Philip M. Wells, Koushik Chakraborty, Gurindar S. ...
DIM
2006
ACM
15 years 7 months ago
User centricity: a taxonomy and open issues
User centricity is a significant concept in federated identity management (FIM), as it provides for stronger user control and privacy. However, several notions of user-centricity...
Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas ...
114
Voted
ISSTA
2006
ACM
15 years 7 months ago
Coverage and adequacy in software product line testing
Software product line modeling has received a great deal of attention for its potential in fostering reuse of software artifacts across development phases. Research on the testing...
Myra B. Cohen, Matthew B. Dwyer, Jiangfan Shi
« Prev « First page 1515 / 1538 Last » Next »