Sciweavers

1399 search results - page 279 / 280
» An agent system reasoning about the web and the user
Sort
View
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
14 years 9 days ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
WIKIS
2006
ACM
13 years 11 months ago
Semantic Wikipedia
Wikipedia is the world’s largest collaboratively edited source of encyclopaedic knowledge. But in spite of its utility, its contents are barely machine-interpretable. Structural...
Heiko Haller, Markus Krötzsch, Max Völke...
PLDI
2003
ACM
13 years 10 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
BMCBI
2006
249views more  BMCBI 2006»
13 years 5 months ago
Gene functional similarity search tool (GFSST)
Background: With the completion of the genome sequences of human, mouse, and other species and the advent of high throughput functional genomic research technologies such as biomi...
Peisen Zhang, Jinghui Zhang, Huitao Sheng, James J...
IJNSEC
2008
201views more  IJNSEC 2008»
13 years 5 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...