Sciweavers

1365 search results - page 244 / 273
» Simple authentication for the web
Sort
View
68
Voted
ACSAC
2001
IEEE
15 years 1 months ago
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions
Vulnerabilities in distributed applications are being uncovered and exploited faster than software engineers can patch the security holes. All too often these weaknesses result fr...
Valentin Razmov, Daniel R. Simon
AAAI
2008
15 years 1 days ago
Existentially Quantified Values for Queries and Updates of Facts in Transaction Logic Programs
In several applications of logic programming and Transaction Logic, such as, planning, trust management and independent Semantic Web Services, an action might produce incomplete f...
Paul Fodor
DMIN
2008
158views Data Mining» more  DMIN 2008»
14 years 11 months ago
Mining User Movement Behavior Patterns in a Mobile Service Environment
Abstract - The rapid advances of wireless and web technologies enable the mobile users to request various kinds of services via mobile devices at anytime and anywhere. To provide t...
Yen-Ssu Chou, Tzung-Shi Chen
ISMB
1998
14 years 11 months ago
Advanced Query Mechanisms for Biological Databases
Existing query interfaces for biological databases are either based on fixed forms or textual query languages. Users of a fixed form-based query interface are limited to performin...
I-Min A. Chen, Anthony Kosky, Victor M. Markowitz,...
BMCBI
2010
163views more  BMCBI 2010»
14 years 9 months ago
Integration of open access literature into the RCSB Protein Data Bank using BioLit
Background: Biological data have traditionally been stored and made publicly available through a variety of on-line databases, whereas biological knowledge has traditionally been ...
Andreas Prlic, Marco A. Martinez, Dimitris Dimitro...