Sciweavers

5934 search results - page 1132 / 1187
» Detecting a Network Failure
Sort
View
HAIS
2010
Springer
15 years 10 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
CSE
2009
IEEE
15 years 10 months ago
Quantifying Utility and Trustworthiness for Advice Shared on Online Social Media
—The growing popularity of social media in recent years has resulted in the creation of an enormous amount of user-developed content. While information is readily available, ther...
Sai T. Moturu, Jian Yang, Huan Liu
MM
2009
ACM
133views Multimedia» more  MM 2009»
15 years 9 months ago
Friend recommendation according to appearances on photos
Unlike the questionnaire based friend recommendation scheme used in Social Network Service (SNS) websites nowadays (e.g. online dating sites, online matchmaking sites), we focus o...
Zhipeng Wu, Shuqiang Jiang, Qingming Huang
MDM
2001
Springer
15 years 9 months ago
Towards Sensor Database Systems
Sensor networks are being widely deployed for measurement, detection and surveillance applications. In these new applications, users issue long-running queries over a combination o...
Philippe Bonnet, Johannes Gehrke, Praveen Seshadri
DATE
2000
IEEE
110views Hardware» more  DATE 2000»
15 years 9 months ago
Stochastic Modeling and Performance Evaluation for Digital Clock and Data Recovery Circuits
Clock and data recovery circuits are essential components in communication systems. They directly influence the bit-error-rate performance of communication links. It is desirable...
Alper Demir, Peter Feldmann
« Prev « First page 1132 / 1187 Last » Next »