Sciweavers

311 search results - page 61 / 63
» Secure Information Flow by Self-Composition
Sort
View
PLDI
2009
ACM
14 years 4 days ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
EVOTING
2004
100views Hardware» more  EVOTING 2004»
13 years 6 months ago
E-Democracy in E-Austria
Abstract: Christian Rupp has been appointed Federal Executive Secretary of EGovernment in May of 2003. At that point of time a new E-Government Platform was introduced. He reports ...
Christian Rupp
POPL
2004
ACM
14 years 5 months ago
Simple relational correctness proofs for static analyses and program transformations
We show how some classical static analyses for imperative programs, and the optimizing transformations which they enable, may be expressed and proved correct using elementary logi...
Nick Benton
CONEXT
2006
ACM
13 years 11 months ago
Synergy: blending heterogeneous measurement elements for effective network monitoring
Network traffic matrices are important for various network planning and management operations. Previous work for estimation of traffic matrices is based on either link load record...
Awais Ahmed Awan, Andrew W. Moore
MM
2004
ACM
212views Multimedia» more  MM 2004»
13 years 10 months ago
Nonparametric motion model
Motion information is a powerful cue for visual perception. In the context of video indexing and retrieval, motion content serves as a useful source for compact video representati...
Ling-Yu Duan, Min Xu, Qi Tian, Changsheng Xu