Sciweavers

641 search results - page 113 / 129
» Implementation and use of the PLT scheme Web server
Sort
View
SAC
2009
ACM
14 years 2 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
USITS
1997
13 years 9 months ago
SPAND: Shared Passive Network Performance Discovery
In the Internet today, users and applications must often make decisions based on the performance they expect to receive from other Internet hosts. For example, users can often vie...
Srinivasan Seshan, Mark Stemm, Randy H. Katz
BIBE
2001
IEEE
13 years 11 months ago
An XML Application For Genomic Data Interoperation
As the eXtensible Markup Language (XML) becomes a popular or standard language for exchanging data over the Internet/Web, there are a growing number of genome Web sites that make ...
Kei-Hoi Cheung, Yang Liu, Anuj Kumar, Michael Snyd...
JUCS
2002
116views more  JUCS 2002»
13 years 7 months ago
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
: ATM virtual path (VP) contains bundles of virtual channels (VCs). A VP layer network can be used as a server layer network of VC layer networks and each VC layer network can be a...
Daniel Won-Kyu Hong, Choong Seon Hong, Dong-Sik Yu...
OSDI
2008
ACM
14 years 8 months ago
R2: An Application-Level Kernel for Record and Replay
Library-based record and replay tools aim to reproduce an application's execution by recording the results of selected functions in a log and during replay returning the resu...
Zhenyu Guo, Xi Wang, Jian Tang, Xuezheng Liu, Zhil...