Sciweavers

5451 search results - page 974 / 1091
» Typed Operational Semantics
Sort
View
123
Voted
MSWIM
2005
ACM
15 years 9 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
143
Voted
RAID
2005
Springer
15 years 9 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
SSD
2005
Springer
185views Database» more  SSD 2005»
15 years 9 months ago
Evaluation of a Dynamic Tree Structure for Indexing Query Regions on Streaming Geospatial Data
Most recent research on querying and managing data streams has concentrated on traditional data models where the data come in the form of tuples or XML data. Complex types of strea...
Quinn Hart, Michael Gertz, Jie Zhang
159
Voted
MUM
2004
ACM
170views Multimedia» more  MUM 2004»
15 years 9 months ago
Multiple embedding using robust watermarks for wireless medical images
Within the expanding paradigm of medical imaging and wireless communications there is increasing demand for transmitting diagnostic medical imagery over error-prone wireless commu...
Dominic Osborne, Derek Abbott, Matthew Sorell, Der...
COMPSAC
2009
IEEE
15 years 8 months ago
Towards a Next-Generation Matrix Library for Java
Matrices are essential in many fields of computer science, especially when large amounts of data must be handled efficiently. Despite this demand for matrix software, we were una...
Holger Arndt, Markus Bundschus, Andreas Naegele