Sciweavers

42 search results - page 8 / 9
» Exploiting online sources to accurately geocode addresses
Sort
View
ICSE
2008
IEEE-ACM
14 years 6 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
CCS
2006
ACM
13 years 9 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
CORR
2007
Springer
189views Education» more  CORR 2007»
13 years 5 months ago
Diversity-Multiplexing Tradeoff of Asynchronous Cooperative Diversity in Wireless Networks
Synchronization of relay nodes is an important and critical issue in exploiting cooperative diversity in wireless networks. In this paper, two asynchronous cooperative diversity s...
Shuangqing Wei
RTSS
2003
IEEE
13 years 10 months ago
Adaptive Coherency Maintenance Techniques for Time-Varying Data
Often, data used in on-line decision making (for example, in determining how to react to changes in process behavior, traffic flow control, etc.) is dynamic in nature and hence ...
Ratul kr. Majumdar, Kannan M. Moudgalya, Krithi Ra...
ASPLOS
2008
ACM
13 years 7 months ago
Hardware counter driven on-the-fly request signatures
Today's processors provide a rich source of statistical information on application execution through hardware counters. In this paper, we explore the utilization of these sta...
Kai Shen, Ming Zhong, Sandhya Dwarkadas, Chuanpeng...