Sciweavers

444 search results - page 81 / 89
» DBProxy: A dynamic data cache for Web applications
Sort
View
ICSE
2009
IEEE-ACM
14 years 2 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
SSD
2009
Springer
167views Database» more  SSD 2009»
14 years 1 months ago
Continuous Spatial Authentication
Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such app...
Stavros Papadopoulos, Yin Yang, Spiridon Bakiras, ...
ICDE
2007
IEEE
90views Database» more  ICDE 2007»
14 years 1 months ago
Music Recommendation Mapping and Interface Based on Structural Network Entropy
Recommendation systems generally produce the results of their output to their users in the form of an ordinal list. In the interest of simplicity, these lists are often obscure, ,...
Justin Donaldson
AIED
2005
Springer
14 years 28 days ago
On the Prospects of Intelligent Collaborative E-learning Systems
Collaborative learning is question-driven and open-ended by nature. Many of the techniques developed for intelligent tutoring are applicable only in more structured settings, but f...
Miikka Miettinen, Jaakko Kurhila, Henry Tirri
NCA
2003
IEEE
14 years 19 days ago
Performance Analysis of an Application-level Cooperative Control Protocol
This paper proposes the modeling and the performance analysis of a high-level control protocol – COCOP, which enables cooperative groups of clients to control a shared server de...
Giancarlo Fortino, Carlo Mastroianni, Wilma Russo