Sciweavers

416 search results - page 35 / 84
» Some new approaches for preventing software tampering
Sort
View
107
Voted
CLEF
2007
Springer
15 years 5 months ago
Stemming Approaches for East European Languages
In our participation in this CLEF evaluation campaign, the first objective is to propose and evaluate various indexing and search strategies for the Czech language in order to hop...
Ljiljana Dolamic, Jacques Savoy
AOSD
2007
ACM
15 years 3 months ago
An aspect-oriented approach to bypassing middleware layers
The layered architecture of middleware platforms (such as CORBA, SOAP, J2EE) is a mixed blessing. On the one hand, layers provide services such as demarshaling, session management...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...
CP
2003
Springer
15 years 4 months ago
A SAT-Based Approach to Multiple Sequence Alignment
Multiple sequence alignment is a central problem in Bioinformatics. A known integer programming approach is to apply branch-and-cut to exponentially large graph-theoretic models. T...
Steven David Prestwich, Desmond G. Higgins, Orla O...
ICST
2010
IEEE
14 years 10 months ago
Towards a Testing Methodology for Reactive Systems: A Case Study of a Landing Gear Controller
—In this case study we test a landing gear control system of a military aircraft with the new version of LUTESS, a tool for testing automatically synchronous software. LUTESS req...
Laya Madani, Virginia Papailiopoulou, Ioannis Pari...
EDBT
2012
ACM
395views Database» more  EDBT 2012»
13 years 2 months ago
Data management with SAPs in-memory computing engine
We present some architectural and technological insights on SAP’s HANA database and derive research challenges for future enterprise application development. The HANA database m...
Joos-Hendrik Boese, Cafer Tosun, Christian Mathis,...