ACMSE
15 years 2 months ago
2006 ACM
In this paper we consider the problem of automatically generating test suites associated with web-based enterprise systems. In particular, we discuss the construction of a tool de...
ACMSE
15 years 2 months ago
2006 ACM
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
ACMSE
15 years 2 months ago
2006 ACM
Support Vector Machines (SVMs) have successfully shown efficiencies in many areas such as text categorization. Although recommendation systems share many similarities with text ca...
74
Voted
ACMSE
15 years 2 months ago
2006 ACM
: There is a growing interest in deployment and evaluation of routing protocols for Vehicular Ad-Hoc Wireless Networks (VANETs) in urban contexts. The mobility model of nodes is on...
93
Voted
ACMSE
15 years 2 months ago
2006 ACM
Recent research on computational modeling of visual attention has demonstrated that a bottom-up approach to identifying salient regions within an image can be applied to diverse a...
|