Sciweavers

1682 search results - page 210 / 337
» Techniques for Automating Distributed Real-Time Applications...
Sort
View
UIC
2009
Springer
15 years 4 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
TCSV
2010
14 years 4 months ago
Video Foreground Detection Based on Symmetric Alpha-Stable Mixture Models
Background subtraction (BS) is an efficient technique for detecting moving objects in video sequences. A simple BS process involves building a model of the background and extractin...
Harish Bhaskar, Lyudmila Mihaylova, Alin Achim
ASWEC
2006
IEEE
15 years 4 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
DEBS
2010
ACM
15 years 11 days ago
Complex event processing synergies with predictive analytics
For Complex Event Processing (CEP), the synergy with Predictive Analytics (PA) is a promising research direction. In this paper we focus on the inclusion of PA technologies into C...
Gabriella Toth, Lajos Jeno Fülöp, L&aacu...
JAVA
2001
Springer
15 years 2 months ago
A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system’s design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks, e...
Peter R. Cappello, Dimitros Mourloukos