Sciweavers

195 search results - page 38 / 39
» Architectures for Internal Web Services Deployment
Sort
View
ASWEC
2006
IEEE
14 years 1 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
BTW
2003
Springer
118views Database» more  BTW 2003»
14 years 17 days ago
Skalierbare Verarbeitung von XML mit Infonyte-DB
Abstract: The emerging penetration of IT architectures with XML leads to increasing XML data volumes. Available tools often fail in realizing scalable XML processing for large XML ...
Thomas Tesch, Peter Fankhauser, Tim Weitzel
DGO
2007
150views Education» more  DGO 2007»
13 years 8 months ago
Event-triggered data and knowledge sharing among collaborating government organizations
Solving complex global problems such as illegal immigration, border control, and terrorism requires government organizations at all levels to share not only data but, more importa...
Seema Degwekar, Jeff DePree, Howard W. Beck, Carla...
WWW
2010
ACM
14 years 2 months ago
Distributing private data in challenged network environments
Developing countries face significant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile
WWW
2011
ACM
13 years 2 months ago
Low-infrastructure methods to improve internet access for mobile users in emerging regions
As information technology supports more aspects of modern life, digital access has become an important tool for developing regions to lift themselves from poverty. Though broadban...
Sibren Isaacman, Margaret Martonosi