Sciweavers

211 search results - page 14 / 43
» Tracing an Optical Buffer's Performance: An Effective Approa...
Sort
View
IJSSE
2010
121views more  IJSSE 2010»
14 years 9 months ago
Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks
This paper presents an approach for retrofitting existing web applications with runtime protection against known as well as unseen SQL injection attacks (SQLIAs) without the invol...
San-Tsai Sun, Konstantin Beznosov
ICDE
2010
IEEE
244views Database» more  ICDE 2010»
15 years 11 months ago
Propagating Updates Through XML Views Using Lineage Tracing
We address the problem of updating XML views over relational data by translating view updates expressed in the XQuery update facility to embedded SQL updates. Although our XML view...
Leonidas Fegaras
DSN
2004
IEEE
15 years 3 months ago
On Failure Dependent Protection in Optical Grooming Networks
Resiliency to link failures in optical networks is becoming increasingly important due to the increasing data rate in the fiber. Path protection schemes attempt to guarantee a bac...
Srinivasan Ramasubramanian
ICNP
1997
IEEE
15 years 3 months ago
TCP behavior with many flows
TCP's ability to share a bottleneck fairly and efficiently decreases as the number of competing flows increases. This effect starts to appear when there are more flows than p...
Robert Morris
INFOCOM
2007
IEEE
15 years 6 months ago
Face Tracing Based Geographic Routing in Nonplanar Wireless Networks
— Scalable and efficient routing is a main challenge in the deployment of large ad hoc wireless networks. An essential element of practical routing protocols is their accommodat...
Fenghui Zhang, Hao Li, Anxiao Jiang, Jianer Chen, ...