Sciweavers

343 search results - page 18 / 69
» Isolation Support for Service-based Applications: A Position...
Sort
View
POPL
2006
ACM
14 years 7 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
DAARC
2007
Springer
86views Algorithms» more  DAARC 2007»
14 years 1 months ago
Evaluating Hybrid Versus Data-Driven Coreference Resolution
Abstract. In this paper, we present a systematic evaluation of a hybrid approach of combined rule-based filtering and machine learning to Dutch coreference resolution. Through the...
Iris Hendrickx, Véronique Hoste, Walter Dae...
PAMI
2010
417views more  PAMI 2010»
13 years 6 months ago
Auto-Context and Its Application to High-Level Vision Tasks and 3D Brain Image Segmentation
The notion of using context information for solving high-level vision and medical image segmentation problems has been increasingly realized in the field. However, how to learn a...
Zhuowen Tu, Xiang Bai
IWBRS
2005
Springer
145views Biometrics» more  IWBRS 2005»
14 years 1 months ago
Face Authentication Using One-Class Support Vector Machines
Abstract. This paper proposes a new method for personal identity verification based the analysis of face images applying One Class Support Vector Machines. This is a recently intr...
Manuele Bicego, Enrico Grosso, Massimo Tistarelli
SAC
1999
ACM
13 years 12 months ago
Transaction Processing in PRO-MOTION
To provide data consistency in the presence of failures and concurrency, database methods will continue to be important to the processing of shared information in a mobile computi...
Gary D. Walborn, Panos K. Chrysanthis