Sciweavers

3207 search results - page 621 / 642
» A Semantics for HTN Methods
Sort
View
ASWEC
2006
IEEE
14 years 1 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
CODES
2005
IEEE
14 years 1 months ago
Future wireless convergence platforms
As wireless platforms converge to multimedia systems, architectures must converge to support voice, data, and video applications. From a processor architecture perspective, suppor...
C. John Glossner, Mayan Moudgill, Daniel Iancu, Ga...
ICCV
2005
IEEE
14 years 1 months ago
Object Categorization by Learned Universal Visual Dictionary
This paper presents a new algorithm for the automatic recognition of object classes from images (categorization). Compact and yet discriminative appearance-based object class mode...
John M. Winn, Antonio Criminisi, Thomas P. Minka
KBSE
2005
IEEE
14 years 1 months ago
Clearwater: extensible, flexible, modular code generation
Distributed applications typically interact with a number of heterogeneous and autonomous components that evolve independently. Methodical development of such applications can ben...
Galen S. Swint, Calton Pu, Gueyoung Jung, Wenchang...
WETICE
2005
IEEE
14 years 1 months ago
Evaluation of an awareness distribution mechanism: A simulation approach
In distributed software engineering, the role of informal communication is frequently overlooked. Participants simply employ their own ad-hoc methods of informal communication. Co...
David Nutter, Cornelia Boldyreff