Sciweavers

1675 search results - page 212 / 335
» The Value of a Good Name
Sort
View
IJSSE
2010
121views more  IJSSE 2010»
13 years 6 months ago
Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks
This paper presents an approach for retrofitting existing web applications with runtime protection against known as well as unseen SQL injection attacks (SQLIAs) without the invol...
San-Tsai Sun, Konstantin Beznosov
JCIT
2010
182views more  JCIT 2010»
13 years 3 months ago
CT-Rank: A Time-aware Ranking Algorithm for Web Search
Time plays important roles in Web search, because most Web pages contain time information and a lot of Web queries are time-related. However, traditional search engines such as Go...
Peiquan Jin, Xiaowen Li, Hong Chen, Lihua Yue
SIAMIS
2010
190views more  SIAMIS 2010»
13 years 3 months ago
Analysis and Generalizations of the Linearized Bregman Method
This paper analyzes and improves the linearized Bregman method for solving the basis pursuit and related sparse optimization problems. The analysis shows that the linearized Bregma...
Wotao Yin
ICDE
2011
IEEE
207views Database» more  ICDE 2011»
13 years 18 days ago
Monte Carlo query processing of uncertain multidimensional array data
— Array database systems are architected for scientific and engineering applications. In these applications, the value of a cell is often imprecise and uncertain. There are at le...
Tingjian Ge, David Grabiner, Stanley B. Zdonik
SIGMOD
2012
ACM
222views Database» more  SIGMOD 2012»
11 years 11 months ago
Tiresias: a demonstration of how-to queries
In this demo, we will present Tiresias, the first how-to query engine. How-to queries represent fundamental data analysis questions of the form: “How should the input change in...
Alexandra Meliou, Yisong Song, Dan Suciu