Sciweavers

1943 search results - page 285 / 389
» Web application security engineering
Sort
View
ICSE
2009
IEEE-ACM
15 years 10 months ago
Verifying networked programs using a model checker extension
Model checking finds failures in software by exploring every possible execution schedule. Until recently it has been mainly applied to stand-alone applications. This paper presen...
Watcharin Leungwattanakit, Cyrille Artho, Masami H...
SEMWEB
2007
Springer
15 years 10 months ago
An Ontology Design Pattern for Representing Relevance in OWL
Abstract. Design patterns are widely-used software engineering abstractions which define guidelines for modeling common application scenarios. Ontology design patterns are the ext...
Fernando Bobillo, Miguel Delgado, Juan Góme...
IWPC
1998
IEEE
15 years 8 months ago
Archetypal Source Code Searches: A Survey of Software Developers and Maintainers
In this study, we conducted a survey to generate archetypes of source code searching by programmers across maintenance tasks. Using a questionnaire on a web page, we obtained 69 r...
Susan Elliott Sim, Charles L. A. Clarke, Richard C...
PC
2002
189views Management» more  PC 2002»
15 years 3 months ago
Data management and transfer in high-performance computational grid environments
An emerging class of data-intensive applications involve the geographically dispersed extraction of complex scientific information from very large collections of measured or compu...
William E. Allcock, Joseph Bester, John Bresnahan,...
WWW
2009
ACM
16 years 4 months ago
XQuery in the browser
Since the invention of the Web, the browser has become more and more powerful. By now, it is a programming and execution environment in itself. The predominant language to program...
Ghislain Fourny, Markus Pilman, Daniela Florescu, ...