While current search engines serve known-item search such as homepage finding very well, they generally cannot support exploratory search effectively. In exploratory search, user...
Xuanhui Wang, Bin Tan, Azadeh Shakery, ChengXiang ...
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
To improve software productivity, when constructing new software systems, developers often reuse existing class libraries or frameworks by invoking their APIs. Those APIs, however...
A common limitation of many retrieval models, including the recently proposed axiomatic approaches, is that retrieval scores are solely based on exact (i.e., syntactic) matching o...
We show the first detailed realistic e-business application scenario that uses and exploits capabilities of the SweetRules V2.1 toolset for e-contracting using the SweetDeal approa...