Sciweavers

348 search results - page 69 / 70
» Secure Computation on the Web: Computing without Simultaneou...
Sort
View
OOPSLA
2004
Springer
13 years 10 months ago
Method-level phase behavior in java workloads
Java workloads are becoming more and more prominent on various computing devices. Understanding the behavior of a Java workload which includes the interaction between the applicat...
Andy Georges, Dries Buytaert, Lieven Eeckhout, Koe...
ICALP
2010
Springer
13 years 10 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
ACMDIS
2004
ACM
13 years 10 months ago
The information discovery framework
This paper continues the movement from technology centered to human centered approaches in the study of tasks that involve finding, understanding, and using information, and tools...
Andruid Kerne, Steven M. Smith
RAID
2005
Springer
13 years 10 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
RECSYS
2009
ACM
13 years 11 months ago
Increasing engagement through early recommender intervention
Social network sites rely on the contributions of their members to create a lively and enjoyable space. Recent research has focused on using personalization and recommender techno...
Jill Freyne, Michal Jacovi, Ido Guy, Werner Geyer