Sciweavers

15781 search results - page 3061 / 3157
» Evaluating Information Extraction
Sort
View
90
Voted
SCHULE
2007
Springer
15 years 9 months ago
Anwenden und Verstehen des Internets - eine Erprobung im Informatikunterricht
: In diesem Beitrag geht es um die Erprobung eines Unterrichtskonzepts zum Thema „Strukturen des Internets“, die Teil eines größeren Forschungsprojekts ist. Das Ziel ist die ...
S. Freischlad
166
Voted
ASWEC
2006
IEEE
15 years 9 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
113
Voted
AUIC
2006
IEEE
15 years 9 months ago
Patternprogrammer: yet another rule-based programming environment for children
Graphical rewrite rules are often used in programming environments for children. These rules consist of two parts: a left-hand side, which is visually matched in the environment, ...
Tim Wright
120
Voted
CGO
2006
IEEE
15 years 9 months ago
Exhaustive Optimization Phase Order Space Exploration
The phase-ordering problem is a long standing issue for compiler writers. Most optimizing compilers typically have numerous different code-improving phases, many of which can be a...
Prasad Kulkarni, David B. Whalley, Gary S. Tyson, ...
132
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in Wireless Sensor Networks
— Coverage is an important issue related to WSN quality of service. Several centralized/decentralized solutions based on the geometry information of sensors and under the assumpt...
Azzedine Boukerche, Xin Fei, Regina Borges de Arau...
« Prev « First page 3061 / 3157 Last » Next »