150
Voted
ACMSE
15 years 9 months ago
2006 ACM
In this paper we consider the problem of automatically generating test suites associated with web-based enterprise systems. In particular, we discuss the construction of a tool de...
132
Voted
ACMSE
15 years 9 months ago
2006 ACM
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
105
Voted
ACMSE
15 years 9 months ago
2006 ACM
Support Vector Machines (SVMs) have successfully shown efficiencies in many areas such as text categorization. Although recommendation systems share many similarities with text ca...
131
Voted
ACMSE
15 years 9 months ago
2006 ACM
: There is a growing interest in deployment and evaluation of routing protocols for Vehicular Ad-Hoc Wireless Networks (VANETs) in urban contexts. The mobility model of nodes is on...
141
Voted
ACMSE
15 years 9 months ago
2006 ACM
Recent research on computational modeling of visual attention has demonstrated that a bottom-up approach to identifying salient regions within an image can be applied to diverse a...
|