Sciweavers

3389 search results - page 564 / 678
» Perspectives on system identification
Sort
View
ACMSE
2006
ACM
15 years 10 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
CONEXT
2006
ACM
15 years 10 months ago
Proposition of a cross-layer architecture model for the support of QoS in ad-hoc networks
Due to the lack of built-in quality of service support, IEEE 802.11 ad-hoc networks presents serious defies in meeting the demands of multimedia applications. To overcome such ch...
Wafa Berrayana, Habib Youssef, Stéphane Loh...
3DIM
2005
IEEE
15 years 10 months ago
Unsupervised 3D Object Recognition and Reconstruction in Unordered Datasets
This paper presents a system for fully automatic recognition and reconstruction of 3D objects in image databases. We pose the object recognition problem as one of finding consist...
Matthew Brown, David G. Lowe
CSB
2005
IEEE
206views Bioinformatics» more  CSB 2005»
15 years 10 months ago
Bioinformatic Insights from Metagenomics through Visualization
Cutting-edge biological and bioinformatics research seeks a systems perspective through the analysis of multiple types of high-throughput and other experimental data for the same ...
Susan L. Havre, Bobbie-Jo M. Webb-Robertson, Anuj ...
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
15 years 10 months ago
Who Joins the Platform? The Case of the RFID Business Ecosystem
Today, many knowledge-based technology applications form a business ecosystem: a set of complex products and services made by multiple firms in which no firm is dominant. For this...
Anne Quaadgras