Sciweavers

2899 search results - page 419 / 580
» Dynamic Trees in Practice
Sort
View
154
Voted
ACSAC
2007
IEEE
15 years 10 months ago
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection
With the recent rapid increase in interactive web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats....
Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hish...
166
Voted
CIDM
2007
IEEE
15 years 10 months ago
Prediction of Abnormal Behaviors for Intelligent Video Surveillance Systems
–The OBSERVER is a video surveillance system that detects and predicts abnormal behaviors aiming at the intelligent surveillance concept. The system acquires color images from a ...
Duarte Duque, Henrique Santos, Paulo Cortez
121
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
An Enhanced RFID Multiple Access Protocol for Fast Inventory
- The relevant performance metric for successful deployment of Radio Frequency Identification (RFID) systems for tag inventory applications is the latency for reading all tags with...
You-Chang Ko, Sumit Roy, Joshua R. Smith, Hyung-Wo...
115
Voted
ICRA
2007
IEEE
130views Robotics» more  ICRA 2007»
15 years 10 months ago
Greedy but Safe Replanning under Kinodynamic Constraints
— We consider motion planning problems for a vehicle with kinodynamic constraints, where there is partial knowledge about the environment and replanning is required. We present a...
Kostas E. Bekris, Lydia E. Kavraki
118
Voted
IPPS
2007
IEEE
15 years 10 months ago
Locality-Aware Consistency Maintenance for Heterogeneous P2P Systems
Replication and caching have been deployed widely in current P2P systems. In update-allowed P2P systems, a consistency maintenance mechanism is strongly demanded. Several solution...
Zhenyu Li, Gaogang Xie, Zhongcheng Li