Sciweavers

12493 search results - page 2400 / 2499
» Information Access in the Web
Sort
View
ASWEC
2006
IEEE
15 years 7 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
INFOCOM
2006
IEEE
15 years 7 months ago
SmartSeer: Using a DHT to Process Continuous Queries Over Peer-to-Peer Networks
— As the academic world moves away from physical journals and proceedings towards online document repositories, the ability to efficiently locate work of interest among the torr...
Jayanthkumar Kannan, Beverly Yang, Scott Shenker, ...
MSR
2006
ACM
15 years 7 months ago
MAPO: mining API usages from open source repositories
To improve software productivity, when constructing new software systems, developers often reuse existing class libraries or frameworks by invoking their APIs. Those APIs, however...
Tao Xie, Jian Pei
HICSS
2005
IEEE
159views Biometrics» more  HICSS 2005»
15 years 7 months ago
A Repeatable Collaboration Process for Usability Testing
Evaluating the usability of an application is a crucial activity in systems development projects. It is often done collaboratively, involving groups of current or future users, us...
Gert-Jan de Vreede, Ann L. Fruhling, Anita Chakrap...
ISPAN
2005
IEEE
15 years 7 months ago
Supervised Peer-to-Peer Systems
In this paper we present a general methodology for designing supervised peer-to-peer systems. A supervised peer-to-peer system is a system in which the overlay network is formed b...
Kishore Kothapalli, Christian Scheideler
« Prev « First page 2400 / 2499 Last » Next »