Sciweavers

640 search results - page 108 / 128
» Wrapper Generation for Web Accessible Data Sources
Sort
View
70
Voted
GI
2009
Springer
14 years 7 months ago
Visual Twittering Using Mobile Phones in Pervasive Environments
Abstract: Research in the field of academic teaching and life focuses on the integration of recent technologies. Additionally, new trends within the current usage of e.g. the Inter...
Michael Wittke, Sven Tomforde, Yaser Chaaban, J&uu...
89
Voted
SIGMOD
2011
ACM
218views Database» more  SIGMOD 2011»
14 years 15 days ago
A data-oriented transaction execution engine and supporting tools
Conventional OLTP systems assign each transaction to a worker thread and that thread accesses data, depending on what the transaction dictates. This thread-to-transaction work ass...
Ippokratis Pandis, Pinar Tözün, Miguel B...
61
Voted
ICSE
2009
IEEE-ACM
15 years 4 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
TKDE
2002
123views more  TKDE 2002»
14 years 9 months ago
Coordinated Placement and Replacement for Large-Scale Distributed Caches
In a large-scale information system such as a digital library or the web, a set of distributed caches can improve their effectiveness by coordinating their data placement decisions...
Madhukar R. Korupolu, Michael Dahlin
PCI
2009
Springer
15 years 2 months ago
Exploring Gadget-Based Interfaces for the Social Semantic Desktop
— A large number of tools has recently emerged supporting information management for individuals in their social context. Semantic technologies play an important role in the deve...
Konstantinos Christidis, Niki Papailiou, Gregoris ...