Sciweavers

551 search results - page 1 / 111
» Preventing existence
Sort
View
FOIS
2001
13 years 6 months ago
Preventing existence
Cleo Condoravdi, Dick Crouch, John O. Everett, Val...
AUSDM
2007
Springer
93views Data Mining» more  AUSDM 2007»
13 years 11 months ago
Customer Analytics Projects: Addressing Existing Problems with a Process that Leads to Success
This article explicitly outlines an approach designed to allow optimal utilisation of Analytics in the industry setting. The paper focuses on the key stages of the Analytics proce...
Inna Kolyshkina, Simeon J. Simoff
IJSSE
2010
121views more  IJSSE 2010»
13 years 2 months ago
Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks
This paper presents an approach for retrofitting existing web applications with runtime protection against known as well as unseen SQL injection attacks (SQLIAs) without the invol...
San-Tsai Sun, Konstantin Beznosov
AICCSA
2008
IEEE
227views Hardware» more  AICCSA 2008»
13 years 7 months ago
Preventing admission failures of bandwidth reservation in wireless mesh networks
Quality of Service for wireless mesh networks is an often requested feature for various kinds of applications. A common approach is the hop-by-hop reservation of bandwidth for ind...
André Herms, Georg Lukas
ICDE
2011
IEEE
253views Database» more  ICDE 2011»
12 years 9 months ago
Preventing equivalence attacks in updated, anonymized data
—In comparison to the extensive body of existing work considering publish-once, static anonymization, dynamic anonymization is less well studied. Previous work, most notably
Yeye He, Siddharth Barman, Jeffrey F. Naughton