Sciweavers

2005 search results - page 215 / 401
» Models and Meta Models for Transactions in Web Applications
Sort
View
117
Voted
ACMSE
2006
ACM
15 years 7 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
COMPSAC
2009
IEEE
15 years 5 months ago
Hot Set Identification for Social Network Applications
Several operations of Web-based applications are optimized with respect to the set of resources that will receive the majority of requests in the near future, namely the hot set. U...
Claudia Canali, Michele Colajanni, Riccardo Lancel...
109
Voted
EOR
2007
110views more  EOR 2007»
15 years 1 months ago
A hierarchical ant based clustering algorithm and its use in three real-world applications
In this paper is presented a new model for data clustering, which is inspired from the selfassembly behavior of real ants. Real ants can build complex structures by connecting the...
Hanene Azzag, Gilles Venturini, Antoine Oliver, Ch...
114
Voted
SIGIR
1996
ACM
15 years 6 months ago
Retrieval of Complex Objects Using a Four-Valued Logic
The aggregated structure of documents plays a key role in full-text, multimedia, and network Information Retrieval (IR). Considering aggregation provides new querying facilities a...
Thomas Rölleke, Norbert Fuhr
BMCBI
2006
132views more  BMCBI 2006»
15 years 1 months ago
Length-dependent prediction of protein intrinsic disorder
Background: Due to the functional importance of intrinsically disordered proteins or protein regions, prediction of intrinsic protein disorder from amino acid sequence has become ...
Kang Peng, Predrag Radivojac, Slobodan Vucetic, A....