Sciweavers

284 search results - page 51 / 57
» Characterizing Secure Dynamic Web Applications Scalability
Sort
View
LCN
2007
IEEE
14 years 1 months ago
Lightpath Reconfiguration in Regional IP-over-WDM Networks by a Centralized Control System
—Lightpath reconfiguration performance has been evaluated experimentally for regional IP-over-WDM network applications, making the network scalable and stable when traffic change...
Yutaka Katsuyama, Michio Hashimoto, Keiji Nishikaw...
USS
2008
13 years 10 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...
PVLDB
2010
125views more  PVLDB 2010»
13 years 6 months ago
Interesting-Phrase Mining for Ad-Hoc Text Analytics
Large text corpora with news, customer mail and reports, or Web 2.0 contributions offer a great potential for enhancing business-intelligence applications. We propose a framework ...
Srikanta J. Bedathur, Klaus Berberich, Jens Dittri...
SAC
2009
ACM
14 years 2 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
ICSNW
2004
Springer
84views Database» more  ICSNW 2004»
14 years 1 months ago
Emergent Semantics Systems
With new standards like RDF or OWL paving the way for the much anticipated Semantic Web, a new breed of very large scale semantic systems is about to appear. Traditional semantic r...
Karl Aberer, Tiziana Catarci, Philippe Cudré...