Sciweavers

1059 search results - page 104 / 212
» Standard Logics Are Valuation-Nonmonotonic
Sort
View
ACNS
2004
Springer
284views Cryptology» more  ACNS 2004»
14 years 3 months ago
SQLrand: Preventing SQL Injection Attacks
We present a practical protection mechanism against SQL injection attacks. Such attacks target databases that are accessible through a web frontend, and take advantage of flaws in...
Stephen W. Boyd, Angelos D. Keromytis
CADE
2004
Springer
14 years 3 months ago
Modular Proof Systems for Partial Functions with Weak Equality
The paper presents a modular superposition calculus for the combination of first-order theories involving both total and partial functions. Modularity means that inferences are pu...
Harald Ganzinger, Viorica Sofronie-Stokkermans, Uw...
INEX
2004
Springer
14 years 3 months ago
TIJAH at INEX 2004 Modeling Phrases and Relevance Feedback
This paper discusses our participation in INEX using the TIJAH XML-IR system. We have enriched the TIJAH system, which follows a standard layered database architecture, with severa...
Vojkan Mihajlovic, Georgina Ramírez, Arjen ...
ASYNC
2003
IEEE
119views Hardware» more  ASYNC 2003»
14 years 3 months ago
Asynchronous DRAM Design and Synthesis
We present the design of a high performance on-chip pipelined asynchronous DRAM suitable for use in a microprocessor cache. Although traditional DRAM structures suffer from long a...
Virantha N. Ekanayake, Rajit Manohar
GLVLSI
2003
IEEE
194views VLSI» more  GLVLSI 2003»
14 years 3 months ago
RF CMOS circuit optimizing procedure and synthesis tool
In this paper, we discuss a methodology to design and synthesize analog CMOS components such as RF amplifiers. The inputs of the synthesis tool are the circuit specifications desc...
Chandrasekar Rajagopal, Karthik Sridhar, Adrian Nu...