Sciweavers

1733 search results - page 56 / 347
» There is more to context than location
Sort
View
RAID
2005
Springer
15 years 5 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
AIPS
2007
15 years 2 months ago
Context-Aware Logistic Routing and Scheduling
In context-aware route planning, agents have to plan their route on a common infrastructure in such a way that plans made by other agents are not invalidated, and no conflicts ar...
Adriaan ter Mors, Jonne Zutt, Cees Witteveen
BMCBI
2010
149views more  BMCBI 2010»
14 years 12 months ago
A multifactorial analysis of obesity as CVD risk factor: Use of neural network based methods in a nutrigenetics context
Background: Obesity is a multifactorial trait, which comprises an independent risk factor for cardiovascular disease (CVD). The aim of the current work is to study the complex eti...
Ioannis K. Valavanis, Stavroula G. Mougiakakou, Ke...
MDM
2007
Springer
106views Communications» more  MDM 2007»
15 years 6 months ago
Protecting Moving Trajectories with Dummies
Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike t...
Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee
ANOR
2005
98views more  ANOR 2005»
14 years 11 months ago
Condorcet Winners for Public Goods
In this work, we consider a public facility allocation problem decided through a voting process under the majority rule. A location of the public facility is a majority rule winner...
Lihua Chen, Xiaotie Deng, Qizhi Fang, Feng Tian