Sciweavers

236 search results - page 47 / 48
» adhoc 2005
Sort
View
RAID
2005
Springer
13 years 10 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
SSS
2005
Springer
132views Control Systems» more  SSS 2005»
13 years 10 months ago
Self-stabilizing Mobile Node Location Management and Message Routing
We present simple algorithms for achieving self-stabilizing location management and routing in mobile ad-hoc networks. While mobile clients may be susceptible to corruption and sto...
Shlomi Dolev, Limor Lahiani, Nancy A. Lynch, Tina ...
WSC
2007
13 years 7 months ago
Towards a conceptual framework for visual analytics of time and time-oriented data
Time is an important data dimension with distinct characteristics that is common across many application domains. This demands specialized methods in order to support proper analy...
Wolfgang Aigner, Alessio Bertone, Silvia Miksch, C...
BMCBI
2005
111views more  BMCBI 2005»
13 years 5 months ago
Improving interoperability between microbial information and sequence databases
Background: Biological resources are essential tools for biomedical research. Their availability is promoted through on-line catalogues. Common Access to Biological Resources and ...
Paolo Romano, Peter Dawyndt, Francesca Piersigilli...
CACM
2005
126views more  CACM 2005»
13 years 5 months ago
Extrovert gadgets
This paper presents a set of architectures for the composition of ubiquitous computing applications. It describes research that is being carried out in "extrovert-Gadgets&quo...
Achilles Kameas, Irene Mavrommati