Essays about: "Regex."
Showing result 1 - 5 of 9 essays containing the word Regex..
-
1. Comparing the Performance of Compiled vs Interpreted RegEx
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Regular Expression (RegEx) is one of the most important computer science technologies used for searching through text. Used commonly in almost every corner of computer science that is dependent on searching, it is imperative that they are made to be efficient. Usually, RegEx are implemented through the use of a process called interpretation. READ MORE
-
2. Evaluating User Experiences of Mockup Data created through Regex
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : The purpose of this study is to evaluate the possibility of having a library function capable of creating SQL inserts. The values for the inserts were created through regex. The study is conducted through a user study where the test participants tested three methods to create inserts for SQL, including the library function. READ MORE
-
3. Fine-grained sentiment analysis of product reviews in Swedish
University essay from Uppsala universitet/Institutionen för lingvistik och filologiAbstract : In this study we gather customer reviews from Prisjakt, a Swedish price comparison site, with the goal to study the relationship between review and rating, known as sentiment analysis. The purpose of the study is to evaluate three different supervised machine learning models on a fine-grained dependent variable representing the review rating. READ MORE
-
4. Detecting SQL Injection Attacks in VoIP using Real-time Deep Packet Inspection : Can a Deep Packet Inspection Firewall Detect SQL Injection Attacks on SIP Traffic with Reasonable Performance?
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The use of the Internet has increased over the years, and it is now an integral part of our daily activities, as we often use it for everything from interacting on social media to watching videos online. Phone calls nowadays tend to use Voice over IP (VoIP), rather than the traditional phone networks. READ MORE
-
5. Preventing SQL Injections by Hashing the Query Parameter Data
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : Context. Many applications today use databases to store user informationor other data for their applications. This information can beaccessed through various different languages depending on what typeof database it is. Databases that use SQL can maliciously be exploitedwith SQL injection attacks. READ MORE