Sciweavers

332 search results - page 66 / 67
» Towards an Automatic Analysis of Web Service Security
Sort
View
ASWEC
2006
IEEE
13 years 11 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
USS
2004
13 years 6 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
KI
2002
Springer
13 years 5 months ago
Spatial Strategies in Human-Robot Communication
This paper deals with various kinds of mental representations available for linguistic instruction in spatial humanrobot interaction. After a survey of the literature on spatial r...
Thora Tenbrink, Kerstin Fischer, Reinhard Moratz
PLDI
2006
ACM
13 years 11 months ago
Practical dynamic software updating for C
Software updates typically require stopping and restarting an application, but many systems cannot afford to halt service, or would prefer not to. Dynamic software updating (DSU) ...
Iulian Neamtiu, Michael W. Hicks, Gareth Stoyle, M...
ICSE
2007
IEEE-ACM
14 years 5 months ago
Revel8or: Model Driven Capacity Planning Tool Suite
Designing complex multi-tier applications that must meet strict performance requirements is a challenging software engineering problem. Ideally, the application architect could de...
Liming Zhu, Yan Liu, Ngoc Bao Bui, Ian Gorton