Sciweavers

135 search results - page 27 / 27
» Cryptographic Protocol Analysis on Real C Code
Sort
View
ICSE
2008
IEEE-ACM
14 years 5 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
BMCBI
2006
153views more  BMCBI 2006»
13 years 4 months ago
Intensity-based hierarchical Bayes method improves testing for differentially expressed genes in microarray experiments
Background: The small sample sizes often used for microarray experiments result in poor estimates of variance if each gene is considered independently. Yet accurately estimating v...
Maureen A. Sartor, Craig R. Tomlinson, Scott C. We...
HPDC
2007
IEEE
13 years 11 months ago
A fast topology inference: a building block for network-aware parallel processing
Adapting to the network is the key to achieving high performance for communication-intensive applications, including scientific computing, data intensive computing, and multicast...
Tatsuya Shirai, Hideo Saito, Kenjiro Taura
PAM
2004
Springer
13 years 10 months ago
Measurements and Laboratory Simulations of the Upper DNS Hierarchy
Given that the global DNS system, especially at the higher root and top-levels, experiences significant query loads, we seek to answer the following questions: (1) How does the ch...
Duane Wessels, Marina Fomenkov, Nevil Brownlee, Ki...
EUROSYS
2010
ACM
14 years 1 months ago
Kivati: Fast Detection and Prevention of Atomicity Violations
Bugs in concurrent programs are extremely difficult to find and fix during testing. In this paper, we propose Kivati, which can efficiently detect and prevent atomicity violat...
Lee Chew, David Lie