• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 354
  • 85
  • 42
  • 24
  • 11
  • 11
  • 11
  • 11
  • 11
  • 11
  • 9
  • 7
  • 4
  • 3
  • 2
  • Tagged with
  • 715
  • 715
  • 408
  • 303
  • 302
  • 213
  • 120
  • 106
  • 96
  • 95
  • 94
  • 84
  • 59
  • 58
  • 56
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
221

Contextual and data refinement for the refinement calculus for logic programs /

Colvin, Robert John. January 1900 (has links) (PDF)
Thesis (Ph. D.)--University of Queensland, 2002. / Includes bibliographical references.
222

Semantic integrity recommendations on good design methodology /

Kogan, Irina. January 2001 (has links)
Thesis (M. Sc.)--York University, 2001. Graduate Programme in Computer Science. / Typescript. Includes bibliographical references (leaves 155-159). Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL: http://wwwlib.umi.com/cr/yorku/fullcit?pMQ71641.
223

Language and compiler support for mixin programming

Cardone, Richard Joseph. January 2002 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2002. / Vita. Includes bibliographical references. Available also from UMI Company.
224

Defining and Preventing Code-injection Attacks

Ray, Donald 01 January 2013 (has links)
This thesis shows that existing definitions of code-injection attacks (e.g., SQL-injection attacks) are flawed. The flaws make it possible for attackers to circumvent existing mechanisms, by supplying code-injecting inputs that are not recognized as such. The flaws also make it possible for benign inputs to be treated as attacks. After describing these flaws in conventional definitions of code-injection attacks, this thesis proposes a new definition, which is based on whether the symbols input to an application get used as (normal-form) values in the application's output. Because values are already fully evaluated, they cannot be considered ``code'' when injected. This simple new definition of code-injection attacks avoids the problems of existing definitions, improves our understanding of how and when such attacks occur, and enables us to evaluate the effectiveness of mechanisms for mitigating such attacks.
225

Automated reasoning about actions

Lee, Joohyung 28 August 2008 (has links)
Not available / text
226

Language and compiler support for mixin programming

Cardone, Richard Joseph 18 April 2011 (has links)
Not available / text
227

D: a distributed object oriented programming language

李詠康, Lee, Wing-hong. January 1994 (has links)
published_or_final_version / Electrical and Electronic Engineering / Master / Master of Philosophy
228

THE DESIGN AND IMPLEMENTATION OF A MACHINE-INDEPENDENT GENERAL SYSTEM THEORETIC LANGUAGE

Mullens, Lanny Joe, 1946- January 1973 (has links)
No description available.
229

GESTRE: a teaching system for the computer language DIGEST

Fertig, Janet A. January 1975 (has links)
No description available.
230

The information processing language ALDAT : design and implementation

Kamel, Ragui F. January 1980 (has links)
No description available.

Page generated in 0.0721 seconds