Sciweavers

1611 search results - page 275 / 323
» Experimental Integration of Planning in a Distributed Contro...
Sort
View
SAC
2009
ACM
14 years 3 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
ECOOPW
2008
Springer
13 years 10 months ago
Equation-Based Object-Oriented Languages and Tools
EOOLT'2007 was the first edition of the ECOOP-EOOLT workshop. The workshop is intended to bring researchers associated with different equation-based object-oriented (EOO) mode...
Peter Fritzson, David Broman, François Cell...
IPPS
2008
IEEE
14 years 3 months ago
An effective pointer replication algorithm in P2P networks
Peer-to-Peer (P2P) networks have proven to be an efficient and successful mechanism for file sharing over the Internet. However, current P2P protocols have long worst case query...
Jian Zhou, Laxmi N. Bhuyan, Anirban Banerjee
IPPS
2007
IEEE
14 years 3 months ago
Using Speed Diagrams for Symbolic Quality Management
We present a quality management method for multimedia applications. The method takes as input an application software composed of actions. The execution times of actions are unkno...
Jacques Combaz, Jean-Claude Fernandez, Joseph Sifa...
DEBS
2008
ACM
13 years 10 months ago
Real-time, load-adaptive processing of continuous queries over data streams
We introduce a new type of query, called a real-time continuous query (RCQ), that captures the real-time requirements of processing data streams. We develop techniques to efficien...
Dhananjay Kulkarni, Chinya V. Ravishankar, Mitch C...