Sciweavers

365 search results - page 39 / 73
» Exploiting Model-based Techniques for User Interfaces to Dat...
Sort
View
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
15 years 7 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
DEXAW
2000
IEEE
134views Database» more  DEXAW 2000»
15 years 7 months ago
"'Andreas Rauber'? Conference Pages Are over There, German Documents on the Lower Left, .." - An "Old-Fashioned" Approach to Web
With the massive advance of electronic document repositories, usable interfaces to these repositories gain importance. While sophisticated information retrieval techniques provide...
Andreas Rauber, Harald Bina
PRDC
2002
IEEE
15 years 8 months ago
Caveat Emptor: Making Grid Services Dependable from the Client Side
Grid computing relies on fragile partnerships. Clients with hundreds or even thousands of pending service requests must seek out and form temporary alliances with remote servers e...
Miron Livny, Douglas Thain
ICSE
2009
IEEE-ACM
15 years 10 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
DEXA
2003
Springer
149views Database» more  DEXA 2003»
15 years 8 months ago
Capturing Uncertainty in Spatial Queries over Imprecise Data
Emerging applications using miniature electronic devices (e.g., tracking mobile objects using sensors) generate very large amounts of highly dynamic data that poses very high overh...
Xingbo Yu, Sharad Mehrotra