Sciweavers

16513 search results - page 2906 / 3303
» Numerical Analysis Methods
Sort
View
EDO
2005
Springer
15 years 10 months ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...
138
Voted
EMMCVPR
2005
Springer
15 years 10 months ago
Exploiting Inference for Approximate Parameter Learning in Discriminative Fields: An Empirical Study
Abstract. Estimation of parameters of random field models from labeled training data is crucial for their good performance in many image analysis applications. In this paper, we p...
Sanjiv Kumar, Jonas August, Martial Hebert
176
Voted
EUC
2005
Springer
15 years 10 months ago
Realtime H.264 Encoding System Using Fast Motion Estimation and Mode Decision
Abstract. H.264 provides various useful features such as improved coding efficiency and error robustness. These features enable mobile device to adopt H.264/AVC standard to achieve...
Byeong-Doo Choi, Min-Cheol Hwang, Jun-Ki Cho, Jin-...
EUROCAST
2005
Springer
182views Hardware» more  EUROCAST 2005»
15 years 10 months ago
Computer Vision Application: Real Time Smart Traffic Light
Abstract. The design, development, construction and testing of an ArtificialVision controlled Traffic-Light prototype has been carried out to rule and regulate intersections. Metho...
Ángel Serrano, Cristina Conde, Licesio J. R...
145
Voted
FMCO
2005
Springer
156views Formal Methods» more  FMCO 2005»
15 years 10 months ago
On a Probabilistic Chemical Abstract Machine and the Expressiveness of Linda Languages
babilistic Chemical Abstract Machine and the Expressiveness of Linda Languages Alessandra Di Pierro1 , Chris Hankin2 , and Herbert Wiklicky2 1 Dipartimento di Informatica, Universi...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
« Prev « First page 2906 / 3303 Last » Next »