Sciweavers

97 search results - page 18 / 20
» Are refactorings less error-prone than other changes
Sort
View
RAID
2005
Springer
14 years 1 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
COMPGEOM
2004
ACM
14 years 1 months ago
Single-strip triangulation of manifolds with arbitrary topology
Triangle strips have been widely used for efficient rendering. It is NP-complete to test whether a given triangulated model can be represented as a single triangle strip, so many...
David Eppstein, M. Gopi
VLDB
2004
ACM
180views Database» more  VLDB 2004»
14 years 29 days ago
Bloom Histogram: Path Selectivity Estimation for XML Data with Updates
Cost-based XML query optimization calls for accurate estimation of the selectivity of path expressions. Some other interactive and internet applications can also benefit from suc...
Wei Wang 0011, Haifeng Jiang, Hongjun Lu, Jeffrey ...
ACL
1998
13 years 9 months ago
Compacting the Penn Treebank Grammar
Treebanks, such as the Penn Treebank (PTB), offer a simple approach to obtaining a broad coverage grammar: one can simply read the grammar off the parse trees in the treebank. Whi...
Alexander Krotov, Mark Hepple, Robert J. Gaizauska...
BMCBI
2007
117views more  BMCBI 2007»
13 years 7 months ago
Influence of degree correlations on network structure and stability in protein-protein interaction networks
Background: The existence of negative correlations between degrees of interacting proteins is being discussed since such negative degree correlations were found for the large-scal...
Caroline C. Friedel, Ralf Zimmer