Sciweavers

870 search results - page 157 / 174
» Constructions for Difference Triangle Sets
Sort
View
POPL
2006
ACM
14 years 7 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
ICFP
2008
ACM
14 years 7 months ago
Compiling self-adjusting programs with continuations
Self-adjusting programs respond automatically and efficiently to input changes by tracking the dynamic data dependences of the computation and incrementally updating the output as...
Ruy Ley-Wild, Matthew Fluet, Umut A. Acar
WSDM
2010
ACM
266views Data Mining» more  WSDM 2010»
14 years 5 months ago
Gathering and Ranking Photos of Named Entities with High Precision, High Recall, and Diversity
Knowledge-sharing communities like Wikipedia and automated extraction methods like those of DBpedia enable the construction of large machine-processible knowledge bases with relat...
Bilyana Taneva, Mouna Kacimi, Gerhard Weikum
TLDI
2010
ACM
190views Formal Methods» more  TLDI 2010»
14 years 4 months ago
Distributed programming with distributed authorization
We propose a programming language, called PCML5, for building distributed applications with distributed access control. Target applications include web-based systems in which prog...
Kumar Avijit, Anupam Datta, Robert Harper
CVPR
2010
IEEE
1208views Computer Vision» more  CVPR 2010»
14 years 3 months ago
Visual Tracking Decomposition
We propose a novel tracking algorithm that can work robustly in a challenging scenario such that several kinds of appearance and motion changes of an object occur at the same time....
Junseok Kwon (Seoul National University), Kyoung M...