Sciweavers

2539 search results - page 416 / 508
» Debugging Method Names
Sort
View
IJSSE
2010
121views more  IJSSE 2010»
14 years 7 months ago
Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks
This paper presents an approach for retrofitting existing web applications with runtime protection against known as well as unseen SQL injection attacks (SQLIAs) without the invol...
San-Tsai Sun, Konstantin Beznosov

Publication
183views
14 years 7 months ago
A New Preprocessing Filter for Digital Mammogram
This paper presents a computer-aided approach to enhancing suspicious lesions in digital mammograms. The developed algorithm improves on a well-known preprocessor filter named cont...
Peyman Rahmati, Ghassan Hamarneh, Doron Nussbaum, ...
CORR
2011
Springer
212views Education» more  CORR 2011»
14 years 5 months ago
Combining Neural Networks for Skin Detection
Two types of combining strategies were evaluated namely combining skin features and combining skin classifiers. Several combining rules were applied where the outputs of the skin ...
Chelsia Amy Doukim, Jamal Ahmad Dargham, Ali Cheki...
EJWCN
2011
87views more  EJWCN 2011»
14 years 5 months ago
Resource Allocation for Overlapping MBS Zones
— Multicast and broadcast service (MBS) is one of the important services for next generation wireless systems. In WiMAX, the radio resource unit (i.e., time, frequency, code, etc...
Ray-Guang Cheng, Kuo-Jui Huang
NECO
2011
14 years 5 months ago
Least-Squares Independent Component Analysis
Accurately evaluating statistical independence among random variables is a key element of Independent Component Analysis (ICA). In this paper, we employ a squared-loss variant of ...
Taiji Suzuki, Masashi Sugiyama