Sciweavers

2504 search results - page 476 / 501
» Methods for comparing rankings of search engine results
Sort
View
ASWEC
2006
IEEE
15 years 3 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
SIGCSE
2002
ACM
152views Education» more  SIGCSE 2002»
14 years 9 months ago
Learning styles and performance in the introductory programming sequence
This paper reports on the implication of different preferred learning styles on students'performance in the introductory programming sequence and on work in progress on how t...
Lynda Thomas, Mark Ratcliffe, John Woodbury, Emma ...
FM
2008
Springer
152views Formal Methods» more  FM 2008»
14 years 11 months ago
Constraint Prioritization for Efficient Analysis of Declarative Models
The declarative modeling language Alloy and its automatic analyzer provide an effective tool-set for building designs of systems and checking their properties. The Alloy Analyzer p...
Engin Uzuncaova, Sarfraz Khurshid
CODES
2009
IEEE
15 years 4 months ago
A standby-sparing technique with low energy-overhead for fault-tolerant hard real-time systems
Time redundancy (rollback-recovery) and hardware redundancy are commonly used in real-time systems to achieve fault tolerance. From an energy consumption point of view, time redun...
Alireza Ejlali, Bashir M. Al-Hashimi, Petru Eles
CODES
2008
IEEE
15 years 4 months ago
Cache-aware optimization of BAN applications
Body-area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most biomonitoring ...
Yun Liang, Lei Ju, Samarjit Chakraborty, Tulika Mi...