Sciweavers

1228 search results - page 134 / 246
» Manipulation of Pose Distributions
Sort
View
EDO
2005
Springer
15 years 10 months ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...
CW
2003
IEEE
15 years 10 months ago
PRESENCE : The Sense of Believability of Inaccessible Worlds
With the development of new instruments as telecommunication, teleoperation, computer representation tools, human beings are commonly in situation to perceive and act on spaces th...
Annie Luciani, Daniela Urma, Sylvain Marliè...
ICPP
2003
IEEE
15 years 10 months ago
Tensor Product Formulation for Hilbert Space-Filling Curves
We present a tensor product formulation for Hilbert space-filling curves. Both recursive and iterative formulas are expressed in the paper. We view a Hilbert space-filling curve...
Shen-Yi Lin, Chih-Shen Chen, Li Liu, Chua-Huang Hu...
IPPS
2003
IEEE
15 years 10 months ago
Dynamically Loaded Classes as Shared Libraries: An Approach to Improving Virtual Machine Scalability
Sharing selected data structures among virtual machines of a safe language can improve resource utilization of each participating run-time system. The challenge is to determine wh...
Bernard Wong, Grzegorz Czajkowski, Laurent Dayn&eg...
SBACPAD
2003
IEEE
125views Hardware» more  SBACPAD 2003»
15 years 10 months ago
Applying Scheduling by Edge Reversal to Constraint Partitioning
— Scheduling by Edge Reversal (SER) is a fully distributed scheduling mechanism based on the manipulation of acyclic orientations of a graph. This work uses SER to perform constr...
Marluce Rodrigues Pereira, Patrícia Kayser ...