Sciweavers

846 search results - page 122 / 170
» Transforming structures by set interpretations
Sort
View
EDO
2005
Springer
14 years 2 months ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...
WILF
2005
Springer
112views Fuzzy Logic» more  WILF 2005»
14 years 2 months ago
NEC for Gene Expression Analysis
Aim of this work is to apply a novel comprehensive machine learning tool for data mining to preprocessing and interpretation of gene expression data. Furthermore, some visualizatio...
Roberto Amato, Angelo Ciaramella, N. Deniskina, Ca...
EMMCVPR
2001
Springer
14 years 1 months ago
3D Flux Maximizing Flows
A number of geometric active contour and surface models have been proposed for shape segmentation in the literature. The essential idea is to evolve a curve (in 2D) or a surface (i...
Kaleem Siddiqi, Alexander Vasilevskiy
DLS
2007
133views Languages» more  DLS 2007»
14 years 20 days ago
Mirages: behavioral intercession in a mirror-based architecture
Mirror-based systems are object-oriented reflective architectures built around a set of design principles that lead to reflective APIs which foster a high degree of reusability, l...
Stijn Mostinckx, Tom Van Cutsem, Stijn Timbermont,...
CAISE
2008
Springer
13 years 10 months ago
On the Definition of Service Granularity and Its Architectural Impact
Service granularity generally refers to the size of a service. The fact that services should be large-sized or coarse-grained is often postulated as a fundamental design principle ...
Raf Haesen, Monique Snoeck, Wilfried Lemahieu, Ste...