Sciweavers

6530 search results - page 1226 / 1306
» Application Integration
Sort
View
PERCOM
2009
ACM
15 years 10 months ago
NoShake: Content Stabilization for Shaking Screens of Mobile Devices
—Consumer electronics and mobile devices intended for pervasive applications are often subject to shaking that makes their screen difficult to read. To address this usability cha...
Ahmad Rahmati, Clayton Shepard, Lin Zhong
144
Voted
PLDI
2009
ACM
15 years 10 months ago
Snugglebug: a powerful approach to weakest preconditions
Symbolic analysis shows promise as a foundation for bug-finding, specification inference, verification, and test generation. This paper addresses demand-driven symbolic analysi...
Satish Chandra, Stephen J. Fink, Manu Sridharan
SAC
2009
ACM
15 years 10 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
SAC
2009
ACM
15 years 10 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
WISEC
2009
ACM
15 years 10 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
« Prev « First page 1226 / 1306 Last » Next »