Sciweavers

1040 search results - page 132 / 208
» A Syntactical Approach to Revision
Sort
View
HAIS
2010
Springer
14 years 1 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
INEX
2009
Springer
14 years 1 months ago
Overview of the INEX 2009 Link the Wiki Track
In the third year of the Link the Wiki track, the focus has been shifted to anchor-to-bep link discovery. The participants were encouraged to utilize different technologies to reso...
Darren Wei Che Huang, Shlomo Geva, Andrew Trotman
KIVS
2001
Springer
14 years 1 months ago
Improving the Performance of TCP on Guaranteed Bandwidth Connections
This paper discusses the performance of the Transmission Control Protocol under two aspects: First, the future Internet will provide some kind of service diļ¬€erentiation and bandw...
Hartmut Ritter, Klaus Wehrle, Lars C. Wolf
PAKDD
2001
ACM
157views Data Mining» more  PAKDD 2001»
14 years 1 months ago
Applying Pattern Mining to Web Information Extraction
Information extraction (IE) from semi-structured Web documents is a critical issue for information integration systems on the Internet. Previous work in wrapper induction aim to so...
Chia-Hui Chang, Shao-Chen Lui, Yen-Chin Wu
ISSRE
2000
IEEE
14 years 1 months ago
Can Intuition Become Rigorous? Foundations for UML Model Verification Tools
The Unified Modeling Language, UML, is the objectoriented notation adopted as the standard for objectoriented Analysis and Design by the Object Management Group. This paper report...
José Luis Fernández Alemán, J...