Sciweavers

1943 search results - page 306 / 389
» Web application security engineering
Sort
View
DLOG
2001
15 years 5 months ago
Preserving Modularity in XML Encoding of Description Logics
Description logics have been designed and studied in a modular way. This has allowed a methodic approach to complexity evaluation. We present a way to preserve this modularity in ...
Jérôme Euzenat
DEBU
2010
180views more  DEBU 2010»
15 years 4 months ago
Searching RDF Graphs with SPARQL and Keywords
The proliferation of knowledge-sharing communities like Wikipedia and the advances in automated information extraction from Web pages enable the construction of large knowledge ba...
Shady Elbassuoni, Maya Ramanath, Ralf Schenkel, Ge...
ISPAN
1997
IEEE
15 years 8 months ago
RMESH Algorithms for Parallel String Matching
Abstract- String matching problem received much attention over the years due to its importance in various applications such as text/file comparison, DNA sequencing, search engines,...
Hsi-Chieh Lee, Fikret Erçal
QOSA
2010
Springer
15 years 8 months ago
Good Architecture = Good (ADL + Practices)
In order to ensure the quality of their software development process, companies incorporate best practices from recognized repositories or from their own experiences. These best pr...
Vincent Le Gloahec, Régis Fleurquin, Salah ...
AUIC
2006
IEEE
15 years 10 months ago
Persuasive interaction for collectivist cultures
Persuasive technology is defined as “any interactive product designed to change attitudes or behaviours by making desired outcomes easier to achieve”. It can take the form of...
Rilla Khaled, Robert Biddle, James Noble, Pippin B...