Sciweavers

1114 search results - page 204 / 223
» An Architecture for Peer-to-peer Reasoning
Sort
View
110
Voted
NDSS
2009
IEEE
15 years 5 months ago
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Yacin Nadji, Prateek Saxena, Dawn Song
92
Voted
ICSEA
2009
IEEE
15 years 5 months ago
Ontology Driven E-Government
: This paper presents an approach to model ontologies for the e-Government domain as a basis for an integrated e-Government environment. Over the last couple of years the applicati...
Peter Salhofer, Bernd Stadlhofer, Gerald Tretter
108
Voted
IPPS
2009
IEEE
15 years 5 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
86
Voted
ISW
2009
Springer
15 years 5 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
101
Voted
LPNMR
2009
Springer
15 years 5 months ago
Application of ASP for Automatic Synthesis of Flexible Multiprocessor Systems from Parallel Programs
Configurable on chip multiprocessor systems combine advantages of task-level parallelism and the flexibility of field-programmable devices to customize architectures for paralle...
Harold Ishebabi, Philipp Mahr, Christophe Bobda, M...