Sciweavers

297 search results - page 50 / 60
» Secure Code Generation for Web Applications
Sort
View
JODS
2006
166views Data Mining» more  JODS 2006»
14 years 9 months ago
Model-Driven Ontology Engineering
W3C's Semantic Web provides a common framework that allows data to be shared and reused across application and enterprise. As the Semantic Web shapes the future of the Web, it...
Yue Pan, Guo Tong Xie, Li Ma, Yang Yang, Zhaoming ...
OOPSLA
2005
Springer
15 years 3 months ago
A delta-driven execution model for semantic computing
We describe (and demonstrate) the execution model of a computing platform where computation is both incremental and data-driven. We call such an approach delta-driven. The platfor...
Roly Perera, Jeff Foster, György Koch
ECR
2002
160views more  ECR 2002»
14 years 9 months ago
A New Micro-Payment System Using General Payword Chain
In recent years electronic commerce has grown rapidly as Internet and web technologies have progressed. Therefore, a secure and efficient payment system for general-purpose applic...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
CAV
2011
Springer
253views Hardware» more  CAV 2011»
14 years 1 months ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
SIGOPSE
1994
ACM
15 years 1 months ago
New Directions for Integrated Circuit Cards Operating Systems
Integrated circuit cards or smart cards are now well-known. Applications such as electronic purses (cash units stored in cards), subscriber identification cards used in cellular te...
Pierre Paradinas, Jean-Jacques Vandewalle