Sciweavers

1661 search results - page 224 / 333
» Advanced carving techniques
Sort
View
HAIS
2010
Springer
14 years 2 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
ICAIL
2009
ACM
14 years 2 months ago
Segmentation of legal documents
An overwhelming number of legal documents is available in digital form. However, most of the texts are usually only provided in a semi-structured form, i.e. the documents are stru...
Eneldo Loza Mencía
SAC
2009
ACM
14 years 2 months ago
An ontology-based application in heart electrophysiology: representation, reasoning and visualization on the web
Computational technologies have been increasingly explored to make biomedical knowledge and data more accessible for human understanding, comparison, analysis and communication. I...
Bernardo Gonçalves, Veruska Zamborlini, Gia...
EUROPAR
2009
Springer
14 years 2 months ago
Real-Time Issues in Live Migration of Virtual Machines
This paper addresses the issue of how to meet the strict timing constraints of (soft) real-time virtualized applications while the Virtual Machine (VM) hosting them is undergoing a...
Fabio Checconi, Tommaso Cucinotta, Manuel Stein
HUC
2009
Springer
14 years 2 months ago
A Survey on Localization for Mobile Wireless Sensor Networks
Over the past decade we have witnessed the evolution of wireless sensor networks, with advancements in hardware design, communication protocols, resource efficiency, and other aspe...
Isaac Amundson, Xenofon D. Koutsoukos