Sciweavers

2081 search results - page 392 / 417
» codes 2006
Sort
View
EDBT
2009
ACM
138views Database» more  EDBT 2009»
15 years 5 months ago
FOGGER: an algorithm for graph generator discovery
To our best knowledge, all existing graph pattern mining algorithms can only mine either closed, maximal or the complete set of frequent subgraphs instead of graph generators whic...
Zhiping Zeng, Jianyong Wang, Jun Zhang, Lizhu Zhou
75
Voted
ACSAC
2006
IEEE
15 years 4 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
ASWEC
2006
IEEE
15 years 4 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
AUIC
2006
IEEE
15 years 4 months ago
TIDL: mixed presence groupware support for legacy and custom applications
In this paper, we present a framework to use an arbitrary number of mouse and keyboard input devices controlling Swing based Java applications. These devices can be distributed am...
Peter Hutterer, Benjamin Close, Bruce H. Thomas
BIBE
2006
IEEE
119views Bioinformatics» more  BIBE 2006»
15 years 4 months ago
Large Grain Size Stochastic Optimization Alignment
DNA sequence alignment is a critical step in identifying homology between organisms. The most widely used alignment program, ClustalW, is known to suffer from the local minima pro...
Perry Ridge, Hyrum Carroll, Dan Sneddon, Mark J. C...