Sciweavers

1225 search results - page 245 / 245
» The Instance Complexity Conjecture
Sort
View
CCS
2011
ACM
12 years 6 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
CLUSTER
2011
IEEE
12 years 6 months ago
Performance Characterization and Optimization of Atomic Operations on AMD GPUs
—Atomic operations are important building blocks in supporting general-purpose computing on graphics processing units (GPUs). For instance, they can be used to coordinate executi...
Marwa Elteir, Heshan Lin, Wu-chun Feng
SIGMOD
2012
ACM
190views Database» more  SIGMOD 2012»
11 years 8 months ago
Sample-driven schema mapping
End-users increasingly find the need to perform light-weight, customized schema mapping. State-of-the-art tools provide powerful functions to generate schema mappings, but they u...
Li Qian, Michael J. Cafarella, H. V. Jagadish
INFOCOM
2012
IEEE
11 years 8 months ago
RxIP: Monitoring the health of home wireless networks
Abstract—Deploying home access points (AP) is hard. Untrained users typically purchase, install, and configure a home AP with very little awareness of wireless signal coverage a...
Justin Manweiler, Peter Franklin, Romit Roy Choudh...
ICSE
2012
IEEE-ACM
11 years 8 months ago
Continuous social screencasting to facilitate software tool discovery
—The wide variety of software development tools available today have a great potential to improve the way developers make software, but that potential goes unfulfilled when deve...
Emerson R. Murphy-Hill