Sciweavers

2624 search results - page 347 / 525
» The 2LIP model and its implementations
Sort
View
133
Voted
SEKE
2010
Springer
14 years 11 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
107
Voted
SPIN
2010
Springer
14 years 11 months ago
Analysing Mu-Calculus Properties of Pushdown Systems
Pushdown systems provide a natural model of software with recursive procedure calls. We provide a tool implementing an algorithm for computing the winning regions of a pushdown par...
Matthew Hague, C.-H. Luke Ong
TVCG
2010
194views more  TVCG 2010»
14 years 11 months ago
Declarative Language Design for Interactive Visualization
Abstract—We investigate the design of declarative, domain-specific languages for constructing interactive visualizations. By separating specification from execution, declarativ...
Jeffrey Heer, Michael Bostock
127
Voted
APSCC
2010
IEEE
14 years 10 months ago
On Evaluating and Publishing Data Concerns for Data as a Service
Abstract--The proliferation of Data as a Service (DaaS) available on the Internet and offered by cloud service providers indicates an increasing trend in providing data under Web s...
Hong Linh Truong, Schahram Dustdar
156
Voted
BSN
2009
IEEE
189views Sensor Networks» more  BSN 2009»
14 years 10 months ago
Neural Network Gait Classification for On-Body Inertial Sensors
Clinicians have determined that continuous ambulatory monitoring provides significant preventative and diagnostic benefit, especially to the aged population. In this paper we descr...
Mark A. Hanson, Harry C. Powell Jr., Adam T. Barth...