Sciweavers

1192 search results - page 147 / 239
» Symbolic Query Exploration
Sort
View
143
Voted
COMPSAC
2007
IEEE
15 years 9 months ago
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities
Recently SQL Injection Attack (SIA) has become a major threat to Web applications. Via carefully crafted user input, attackers can expose or manipulate the back-end database of a ...
Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen, ...
ICMCS
2006
IEEE
139views Multimedia» more  ICMCS 2006»
15 years 9 months ago
A Measure for Evaluating Retrieval Techniques based on Partially Ordered Ground Truth Lists
For the RISM A/II collection of musical incipits (short extracts of scores, taken from the beginning), we have established a ground truth based on the opinions of human experts. I...
Rainer Typke, Remco C. Veltkamp, Frans Wiering
AIRS
2005
Springer
15 years 8 months ago
A Query-by-Singing Technique for Retrieving Polyphonic Objects of Popular Music
This paper investigates the problem of retrieving popular music by singing. In contrast to the retrieval of MIDI music, which is easy to acquire the main melody by the selection of...
Hung-Ming Yu, Wei-Ho Tsai, Hsin-Min Wang
114
Voted
ICDAR
2003
IEEE
15 years 8 months ago
Indexing and retrieval of words in old documents
This paper describes a system for efficient indexing and retrieval of words in collections of document images. The proposed method is based on two main principles: unsupervised pr...
Simone Marinai, Emanuele Marino, Giovanni Soda
ECAI
1992
Springer
15 years 7 months ago
A Strategy for the Computation of Conditional Answers
We consider non-Horn Deductive Data Bases (DDB) represented in a First Order language without function symbols. In this context the DDB is an incomplete description of the world. ...
Robert Demolombe