Sciweavers

355 search results - page 39 / 71
» WWM: A Practical Methodology for Web Application Modeling
Sort
View
IEEEARES
2008
IEEE
14 years 2 months ago
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
Mehdi Kiani, Andrew Clark, George M. Mohay
ISLPED
1999
ACM
236views Hardware» more  ISLPED 1999»
14 years 2 days ago
Modeling and automating selection of guarding techniques for datapath elements
While guarded evaluation has proven an effective energy saving technique in arithmetic circuits, good methodologies do not exist for determining when and how to guard for maximal ...
William E. Dougherty, Donald E. Thomas
ELPUB
2007
ACM
13 years 11 months ago
Digitisation and Access to Archival Collections: A Case Study of the Sofia Municipal Government (1878-1879)
The paper presents in brief a project aimed at the development of a methodology and corresponding software tools intended for building of proper environments giving up means for s...
Maria Nisheva-Pavlova, Pavel Pavlov, Nikolay Marko...
COMPSAC
2009
IEEE
14 years 2 months ago
System Safety Requirements as Control Structures
Along with the popularity of software-intensive systems, the interactions between system components and between humans and software applications are becoming more and more complex...
Zhe Chen, Gilles Motet
SIGIR
2010
ACM
13 years 11 months ago
Ready to buy or just browsing?: detecting web searcher goals from interaction data
An improved understanding of the relationship between search intent, result quality, and searcher behavior is crucial for improving the effectiveness of web search. While recent p...
Qi Guo, Eugene Agichtein