Sciweavers

815 search results - page 163 / 163
» Social network analysis and interactive device design analys...
Sort
View
ASWEC
2006
IEEE
14 years 8 days ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
SG
2005
Springer
13 years 11 months ago
Knowledge in the Loop: Semantics Representation for Multimodal Simulative Environments
This article describes the integration of knowledge based techniques into simulative Virtual Reality (VR) applications. The approach is motivated ltimodal Virtual Construction as a...
Marc Erich Latoschik, Peter Biermann, Ipke Wachsmu...
DCC
2004
IEEE
13 years 10 months ago
Adaptive Rate Control Scheme for Video Streaming Over Wireless Channels
Providing continuous video playback with graceful quality degradation over wireless channels is fraught with challenges. Video applications require stringent delay guarantees and ...
Marwan Krunz, Mohamed Hassan
FLAIRS
2001
13 years 7 months ago
Autonomy for SOHO Ground Operations
/Background The SOLAR and HELIOSPHERIC OBSERVATORY (SOHO) project [SOHO Web Page] is being carried out by the European Space Agency (ESA) and the US National Aeronautics and Space ...
Walt Truszkowski, Nick Netreba, Don Ginn, Sanda Ma...
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
13 years 11 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer