Sciweavers

416 search results - page 52 / 84
» Some new approaches for preventing software tampering
Sort
View
INFORMATIKTAGE
2008
15 years 1 months ago
Constraint Based Transformation Theory
During the last 25 years the complexity and functionality of software systems has increased dramatically. Software systems have to be updated and restructured continuously [22]. I...
Stefan Natelberg
WEBI
2005
Springer
15 years 5 months ago
Automatically Generating Labeled Examples for Web Wrapper Maintenance
In order to let software programs gain full benefit from semi-structured web sources, wrapper programs must be built to provide a “machine-readable” view over them. A signific...
Juan Raposo, Alberto Pan, Manuel Álvarez, J...
IMR
2004
Springer
15 years 5 months ago
An Evolvable Meshing Tool Through a Flexible Object-Oriented Design
There are many diverse algorithms for generating a first mesh, refining it and improving it. A tool that allows us to interchange these algorithms according to the requirements ...
M. Cecilia Bastarrica, Nancy Hitschfeld-Kahler
SACMAT
2004
ACM
15 years 5 months ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
CLEF
2006
Springer
15 years 3 months ago
Scientific Data of an Evaluation Campaign: Do We Properly Deal with Them?
Abstract. This paper examines the current way of keeping the data produced during the evaluation campaigns and highlights some shortenings of it. As a consequence, we propose a new...
Maristella Agosti, Giorgio Maria Di Nunzio, Nicola...