Sciweavers

1629 search results - page 146 / 326
» Infeasible Code Detection
Sort
View
WSE
2006
IEEE
15 years 4 months ago
Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...
METRICS
1999
IEEE
15 years 2 months ago
Measuring Clone Based Reengineering Opportunities
Code duplication, plausibly caused by copying source code and slightly modifying it, is often observed in large systems. Clone detection and documentation have been investigated b...
Magdalena Balazinska, Ettore Merlo, Michel Dagenai...
VISUAL
1999
Springer
15 years 2 months ago
Integrated Parsing of Compressed Video
A technique for detecting scene changes in compressed video streams is proposed which combines multiple modes of information. The proposed technique directly exploits and combines ...
Suchendra M. Bhandarkar, Yashodhan S. Warke, Aparn...
CODES
2008
IEEE
15 years 4 months ago
Cache-aware optimization of BAN applications
Body-area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most biomonitoring ...
Yun Liang, Lei Ju, Samarjit Chakraborty, Tulika Mi...
WWW
2007
ACM
15 years 10 months ago
Using d-gap patterns for index compression
Sequential patterns of d-gaps exist pervasively in inverted lists of Web document collection indices due to the cluster property. In this paper the information of d-gap sequential...
Jinlin Chen, Terry Cook