Sciweavers

5451 search results - page 908 / 1091
» Typed Operational Semantics
Sort
View
DOCENG
2009
ACM
15 years 10 months ago
On the analysis of queries with counting constraints
We study the analysis problem of XPath expressions with counting constraints. Such expressions are commonly used in document transformations or programs in which they select porti...
Everardo Bárcenas, Pierre Genevès, N...
117
Voted
ACSAC
2008
IEEE
15 years 10 months ago
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks
Cross-site Scripting (XSS) has emerged to one of the most prevalent type of security vulnerabilities. While the reason for the vulnerability primarily lies on the serverside, the ...
Martin Johns, Björn Engelmann, Joachim Posegg...
120
Voted
CCGRID
2008
IEEE
15 years 10 months ago
Bad Words: Finding Faults in Spirit's Syslogs
—Accurate fault detection is a key element of resilient computing. Syslogs provide key information regarding faults, and are found on nearly all computing systems. Discovering ne...
Jon Stearley, Adam J. Oliner
92
Voted
DATE
2008
IEEE
114views Hardware» more  DATE 2008»
15 years 10 months ago
A Single-supply True Voltage Level Shifter
When a signal traverses on-chip voltage domains, a level shifter is required. Inverters can handle a high to low voltage shift with minimal leakage. For a low to high voltage leve...
Rajesh Garg, Gagandeep Mallarapu, Sunil P. Khatri
133
Voted
ICAS
2008
IEEE
227views Robotics» more  ICAS 2008»
15 years 10 months ago
The 4C Reference Model for Distributed User Interfaces
Distributed User Interfaces (DUIs) are those interfaces whose different parts can be distributed in time and space on different monitors, screens, and computing platforms, dependi...
Alexandre Demeure, Jean-Sebastien Sottet, Gaë...