Sciweavers

1995 search results - page 345 / 399
» Adaptive Information Filtering using Evolutionary Computatio...
Sort
View
SAC
2009
ACM
14 years 2 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
SERA
2007
Springer
14 years 1 months ago
Comparative Analysis of Neural Network Techniques Vs Statistical Methods in Capacity Planning
Capacity planning is a technique which can be used to predict the computing resource needs of an organization for the future after studying current usage patterns. This is of spec...
Nalini Vasudevan, Gowri C. Parthasarathy
WACV
2005
IEEE
14 years 1 months ago
Ensemble Methods in the Clustering of String Patterns
We address the problem of clustering of contour images from hardware tools based on string descriptions, in a comparative study of cluster combination techniques. Several clusteri...
André Lourenço, Ana L. N. Fred
ROBOCUP
2009
Springer
289views Robotics» more  ROBOCUP 2009»
14 years 5 days ago
Real-Time Hand Gesture Recognition for Human Robot Interaction
In this article a hand gesture recognition system that allows interacting with a service robot, in dynamic environments and in real-time, is proposed. The system detects hands and ...
Mauricio Correa, Javier Ruiz-del-Solar, Rodrigo Ve...
EWCBR
2006
Springer
13 years 11 months ago
Case-Based Reasoning for Knowledge-Intensive Template Selection During Text Generation
The present paper describes a case-based reasoning solution for solving the task of selecting adequate templates for realizing messages describing actions in a given domain. This s...
Raquel Hervás, Pablo Gervás