Sciweavers

5220 search results - page 121 / 1044
» Changing Persistent Applications
Sort
View
FOCM
2002
83views more  FOCM 2002»
15 years 4 months ago
A Rigorous ODE Solver and Smale's 14th Problem
We present an algorithm for computing rigorous solutions to a large class of ordinary differential equations. The main algorithm is based on a partitioning process and the use of i...
Warwick Tucker
FAST
2009
15 years 2 months ago
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, an...
Ragib Hasan, Radu Sion, Marianne Winslett
ICDE
2008
IEEE
122views Database» more  ICDE 2008»
16 years 5 months ago
On Signatures for Communication Graphs
Abstract-- Communications between individuals can be represented by (weighted, multi-) graphs. Many applications operate on communication graphs associated with telephone calls, em...
Graham Cormode, Flip Korn, S. Muthukrishnan, Yihua...
ICSE
2009
IEEE-ACM
15 years 11 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
16 years 5 months ago
Uncovering Database Access Optimizations in the Middle Tier with TORPEDO
A popular architecture for enterprise applications is one of a stateless object-based server accessing persistent data through Object-Relational mapping software. The reported ben...
Bruce E. Martin