Sciweavers

1359 search results - page 252 / 272
» Black-Box Program Specialization
Sort
View
KBSE
2005
IEEE
15 years 10 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
152
Voted
SIGUCCS
2005
ACM
15 years 10 months ago
Developing a synchronous web seminar application for online learning
Many higher education institutions are searching for cost effective tools for the delivery of a feature rich, synchronous online learning environment. While there are several comm...
Michael D. Ciocco, Neil Toporski, Michael Dorris
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
15 years 10 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
SIGADA
2005
Springer
15 years 10 months ago
The affordable application of formal methods to software engineering
The purpose of this research paper is to examine (1) why formal methods are required for software systems today; (2) the Praxis High Integrity Systems’ Correctness-by-Constructi...
James F. Davis
MM
2004
ACM
147views Multimedia» more  MM 2004»
15 years 10 months ago
Implementation and evaluation of EXT3NS multimedia file system
The EXT3NS is a scalable file system designed to handle video streaming workload in large-scale on-demand streaming services. It is based on a special H/W device, called Network-S...
Baik-Song Ahn, Sung-Hoon Sohn, Chei-Yol Kim, Gyu-I...