Sciweavers

5607 search results - page 1104 / 1122
» Graph structure in the Web
Sort
View
ASWEC
2006
IEEE
14 years 3 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
HT
2006
ACM
14 years 3 months ago
HT06, tagging paper, taxonomy, Flickr, academic article, to read
In recent years, tagging systems have become increasingly popular. These systems enable users to add keywords (i.e., “tags”) to Internet resources (e.g., web pages, images, vi...
Cameron Marlow, Mor Naaman, Danah Boyd, Marc Davis
IMC
2006
ACM
14 years 3 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
MIR
2006
ACM
172views Multimedia» more  MIR 2006»
14 years 3 months ago
Combining audio-based similarity with web-based data to accelerate automatic music playlist generation
We present a technique for combining audio signal-based music similarity with web-based musical artist similarity to accelerate the task of automatic playlist generation. We demon...
Peter Knees, Tim Pohle, Markus Schedl, Gerhard Wid...
SIGIR
2006
ACM
14 years 3 months ago
Thread detection in dynamic text message streams
Text message stream is a newly emerging type of Web data which is produced in enormous quantities with the popularity of Instant Messaging and Internet Relay Chat. It is benefici...
Dou Shen, Qiang Yang, Jian-Tao Sun, Zheng Chen
« Prev « First page 1104 / 1122 Last » Next »