Sciweavers

2230 search results - page 405 / 446
» Reformulating Constraint Models Using Input Data
Sort
View
USS
2010
14 years 7 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
EDBT
2008
ACM
194views Database» more  EDBT 2008»
15 years 9 months ago
XCraft: boosting the performance of active XML materialization
An active XML (AXML) document contains tags representing calls to Web services. Therefore, retrieving its contents consists in materializing its data elements by invoking the embe...
Gabriela Ruberg, Marta Mattoso
MLDM
2005
Springer
15 years 3 months ago
SSC: Statistical Subspace Clustering
Subspace clustering is an extension of traditional clustering that seeks to find clusters in different subspaces within a dataset. This is a particularly important challenge with...
Laurent Candillier, Isabelle Tellier, Fabien Torre...
ANTSW
2004
Springer
15 years 3 months ago
An Ant Approach to Membership Overlay Design
Designing an optimal overlay communication network for a set of processes on the Internet is a central problem of peer-to-peer (P2P) computing. Such a network defines membership a...
Vittorio Maniezzo, Marco A. Boschetti, Márk...
INFOCOM
2002
IEEE
15 years 2 months ago
Increasing robustness of fault localization through analysis of lost, spurious, and positive symptoms
—This paper utilizes belief networks to implement fault localization in communication systems taking into account comprehensive information about the system behavior. Most previo...
Malgorzata Steinder, Adarshpal S. Sethi