Sciweavers

1980 search results - page 27 / 396
» On the Associative Nijenhuis Relation
Sort
View
ESSOS
2010
Springer
15 years 4 months ago
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks
Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
Ben H. Smith, Laurie Williams, Andrew Austin
ISI
2007
Springer
15 years 4 months ago
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Christopher C. Yang, Tobun D. Ng
SEKE
2005
Springer
15 years 3 months ago
Institution Morphisms for Relating OWL and Z
Checking for properties of Web ontologies is important for the development of reliable Semantic Web systems. Software specification and verification tools can be used to complem...
Dorel Lucanu, Yuan-Fang Li, Jin Song Dong
ROCAI
2004
Springer
15 years 3 months ago
ROC Optimisation of Safety Related Systems
Abstract. Many safety related and critical systems warn of potentially dangerous events; for example the Short Term Conflict Alert (STCA) system warns of airspace infractions betw...
Jonathan E. Fieldsend, Richard M. Everson
KDD
2005
ACM
103views Data Mining» more  KDD 2005»
15 years 10 months ago
Fast discovery of unexpected patterns in data, relative to a Bayesian network
We consider a model in which background knowledge on a given domain of interest is available in terms of a Bayesian network, in addition to a large database. The mining problem is...
Szymon Jaroszewicz, Tobias Scheffer