Sciweavers

16516 search results - page 3247 / 3304
» A New Approach for FCSRs
Sort
View
97
Voted
KBSE
2005
IEEE
15 years 6 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
SSDBM
2005
IEEE
159views Database» more  SSDBM 2005»
15 years 6 months ago
Clustering Moving Objects via Medoid Clusterings
Modern geographic information systems do not only have to handle static information but also dynamically moving objects. Clustering algorithms for these moving objects provide new...
Hans-Peter Kriegel, Martin Pfeifle
VISUALIZATION
2005
IEEE
15 years 6 months ago
Exploring 2D Tensor Fields Using Stress Nets
In this article we describe stress nets, a technique for exploring 2D tensor fields. Our method allows a user to examine simultaneously the tensors' eigenvectors (both major ...
Andrew Wilson, Rebecca M. Brannon
WACV
2005
IEEE
15 years 6 months ago
Epipolar Constraints for Vision-Aided Inertial Navigation
— This paper describes a new method to improve inertial navigation using feature-based constraints from one or more video cameras. The proposed method lengthens the period of tim...
David D. Diel, Paul DeBitetto, Seth J. Teller
147
Voted
AOSD
2005
ACM
15 years 6 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
« Prev « First page 3247 / 3304 Last » Next »