Sciweavers

369 search results - page 33 / 74
» Requirements Engineering for Industrial Systems: No Easy Ans...
Sort
View
PLDI
2009
ACM
15 years 4 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
HOTSWUP
2009
ACM
15 years 2 months ago
Online Application Upgrade Using Edition-Based Redefinition
This paper describes Edition-Based Redefinition (EBR) in the Oracle database — a novel technology and methodology to build database application patches so that installation of t...
Alan Choi
SIGPRO
2010
137views more  SIGPRO 2010»
14 years 8 months ago
Satellite image compression by post-transforms in the wavelet domain
This paper proposes a novel compression scheme with a tunable complexity-ratedistortion trade-off. As images increase in size and resolution, more efficient compression schemes w...
Xavier Delaunay, Marie Chabert, Vincent Charvillat...
DFG
2004
Springer
15 years 3 months ago
Combining Formal Methods and Safety Analysis - The ForMoSA Approach
In the ForMoSA project [17] an integrated approach for safety analysis of critical, embedded systems has been developed. The approach brings together the best of engineering practi...
Frank Ortmeier, Andreas Thums, Gerhard Schellhorn,...
ECWEB
2004
Springer
177views ECommerce» more  ECWEB 2004»
15 years 3 months ago
Analysis of Mobile Business Processes for the Design of Mobile Information Systems
Abstract. The adoption of mobile technologies into companies frequently follows a technology -driven approach without precise knowledge about the potential benefits that may be rea...
André Köhler, Volker Gruhn