Sciweavers

1880 search results - page 318 / 376
» A Static Analysis for Beta-Binders
Sort
View
WSE
2006
IEEE
15 years 3 months ago
Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...
APLAS
2006
ACM
15 years 3 months ago
A Practical String Analyzer by the Widening Approach
The static determination of approximated values of string expressions has many potential applications. For instance, approximated string values may be used to check the validity an...
Tae-Hyoung Choi, Oukseh Lee, Hyunha Kim, Kyung-Goo...
INTERSENSE
2006
ACM
15 years 3 months ago
Multipath virtual sink architecture for wireless sensor networks in harsh environments
Wireless sensor networks are expected to be deployed in harsh environments characterized by extremely poor and fluctuating channel conditions. With the generally adopted single-s...
Winston Khoon Guan Seah, Hwee Pink Tan
SIGCSE
2006
ACM
147views Education» more  SIGCSE 2006»
15 years 3 months ago
Image understanding as a second course in AI: preparing students for research
This paper describes the development and structure of a second course in artificial intelligence that was developed to meet the needs of upper-division undergraduate and graduate ...
Roxanne L. Canosa
DSN
2005
IEEE
15 years 3 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...