Sciweavers

1748 search results - page 218 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
ECWEB
2003
Springer
110views ECommerce» more  ECWEB 2003»
15 years 7 months ago
Transformation of XML Data Using an Unranked Tree Transducer
Transformation of data documents is of special importance to use XML as the universal data interchange format on the Web. Data transformation is used in many tasks that require dat...
Tadeusz Pankowski
177
Voted
OOPSLA
2001
Springer
15 years 7 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
106
Voted
ESAW
2006
Springer
15 years 6 months ago
Competence Checking for the Global E-Service Society Using Games
Abstract. We study the problem of checking the competence of communicative agents operating in a global society in order to receive and offer electronic services. Such a society wi...
Kostas Stathis, George Lekeas, Christos Kloukinas
ADBIS
2006
Springer
182views Database» more  ADBIS 2006»
15 years 8 months ago
A Middleware-Based Approach to Database Caching
Database caching supports declarative query processing close to the application. Using a full-fledged DBMS as cache manager, it enables the evaluation of specific project-select-...
Andreas Bühmann, Theo Härder, Christian ...
CICLING
2009
Springer
15 years 6 months ago
Language Identification on the Web: Extending the Dictionary Method
Abstract. Automated language identification of written text is a wellestablished research domain that has received considerable attention in the past. By now, efficient and effecti...
Radim Rehurek, Milan Kolkus