Sciweavers

408 search results - page 66 / 82
» One evaluation of model-based testing and its automation
Sort
View
KBSE
2005
IEEE
14 years 2 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
BMCBI
2008
85views more  BMCBI 2008»
13 years 9 months ago
Normalizing biomedical terms by minimizing ambiguity and variability
Background: One of the difficulties in mapping biomedical named entities, e.g. genes, proteins, chemicals and diseases, to their concept identifiers stems from the potential varia...
Yoshimasa Tsuruoka, John McNaught, Sophia Ananiado...
WWW
2004
ACM
14 years 9 months ago
A hierarchical monothetic document clustering algorithm for summarization and browsing search results
Organizing Web search results into a hierarchy of topics and subtopics facilitates browsing the collection and locating results of interest. In this paper, we propose a new hierar...
Krishna Kummamuru, Rohit Lotlikar, Shourya Roy, Ka...
ESSOS
2010
Springer
14 years 5 months ago
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests
Protecting users in the ubiquitous online world is becoming more and more important, as shown by web application security – or the lack thereof – making the mainstream news. On...
Philippe De Ryck, Lieven Desmet, Thomas Heyman, Fr...
HICSS
2006
IEEE
139views Biometrics» more  HICSS 2006»
14 years 2 months ago
Tools for Building Intelligent Tutoring Systems
Intelligent Tutoring Systems (ITSs) have proved useful in a variety of domains, but are notoriously resource intensive to build. We have created two programs (“tutor generatorsâ...
Viswanathan Kodaganallur, Rob R. Weitz, David Rose...