Sciweavers

7 search results - page 2 / 2
» Analyzing Security Scenarios Using Defence Trees and Answer ...
Sort
View
PLDI
2009
ACM
14 years 2 days ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
BMCBI
2006
159views more  BMCBI 2006»
13 years 5 months ago
MultiSeq: unifying sequence and structure data for evolutionary analysis
Background: Since the publication of the first draft of the human genome in 2000, bioinformatic data have been accumulating at an overwhelming pace. Currently, more than 3 million...
Elijah Roberts, John Eargle, Dan Wright, Zaida Lut...