Sciweavers

4166 search results - page 827 / 834
» Automating the constraining process
Sort
View
KBSE
2010
IEEE
13 years 5 months ago
MiTV: multiple-implementation testing of user-input validators for web applications
User-input validators play an essential role in guarding a web application against application-level attacks. Hence, the security of the web application can be compromised by defe...
Kunal Taneja, Nuo Li, Madhuri R. Marri, Tao Xie, N...
PVLDB
2010
128views more  PVLDB 2010»
13 years 5 months ago
Update Rewriting and Integrity Constraint Maintenance in a Schema Evolution Support System: PRISM++
Supporting legacy applications when the database schema evolves represents a long-standing challenge of practical and theoretical importance. Recent work has produced algorithms a...
Carlo Curino, Hyun Jin Moon, Alin Deutsch, Carlo Z...
RTAS
2010
IEEE
13 years 5 months ago
Multi-Application Deployment in Shared Sensor Networks Based on Quality of Monitoring
Abstract—Wireless sensor networks are evolving from dedicated application-specific platforms to integrated infrastructure shared by multiple applications. Shared sensor networks...
Sangeeta Bhattacharya, Abusayeed Saifullah, Chenya...
TCBB
2010
136views more  TCBB 2010»
13 years 5 months ago
Efficient Extraction of Protein-Protein Interactions from Full-Text Articles
—Proteins and their interactions govern virtually all cellular processes, such as regulation, signaling, metabolism, and structure. Most experimental findings pertaining to such ...
Jörg Hakenberg, Robert Leaman, Nguyen Ha Vo, ...
ICDM
2010
IEEE
152views Data Mining» more  ICDM 2010»
13 years 5 months ago
Reviewer Profiling Using Sparse Matrix Regression
Thousands of scientific conferences happen every year, and each involves a laborious scientific peer review process conducted by one or more busy scientists serving as Technical/Sc...
Evangelos E. Papalexakis, Nicholas D. Sidiropoulos...