Sciweavers

353 search results - page 40 / 71
» Better Scripts, Better Games
Sort
View
COMSIS
2006
141views more  COMSIS 2006»
13 years 8 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic
NAR
2000
128views more  NAR 2000»
13 years 8 months ago
The IMB Jena Image Library of Biological Macromolecules
The IMB Jena Image Library of Biological Macromolecules (http://www.imb-jena.de/IMAGE.html ) is aimed at a better dissemination of information on three-dimensional biopolymer stru...
Jan Reichert, Andreas Jabs, Peter Slickers, Jü...
PVLDB
2010
96views more  PVLDB 2010»
13 years 6 months ago
Scalable Data Exchange with Functional Dependencies
The recent literature has provided a solid theoretical foundation for the use of schema mappings in data-exchange applications. Following this formalization, new algorithms have b...
Bruno Marnette, Giansalvatore Mecca, Paolo Papotti
WACV
2012
IEEE
12 years 4 months ago
Tools for richer crowd source image annotations
Crowd-sourcing tools such as Mechanical Turk are popular for annotation of large scale image data sets. Typically, these annotations consist of bounding boxes or coarse outlines o...
Joshua Little, Austin Abrams, Robert Pless
ASSETS
2008
ACM
13 years 10 months ago
What's new?: making web page updates accessible
Web applications facilitated by technologies such as JavaScript, DHTML, AJAX, and Flash use a considerable amount of dynamic web content that is either inaccessible or unusable by...
Yevgen Borodin, Jeffrey P. Bigham, Rohit Raman, I....