Sciweavers

3456 search results - page 614 / 692
» Byte Code Engineering
Sort
View
CCS
2010
ACM
15 years 2 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
BMCBI
2008
151views more  BMCBI 2008»
15 years 2 months ago
Application of the Linux cluster for exhaustive window haplotype analysis using the FBAT and Unphased programs
Background: Genetic association studies have been used to map disease-causing genes. A newly introduced statistical method, called exhaustive haplotype association study, analyzes...
Hiroyuki Mishima, Andrew C. Lidral, Jun Ni
103
Voted
CL
2008
Springer
15 years 2 months ago
Unanticipated partial behavioral reflection: Adapting applications at runtime
Dynamic, unanticipated adaptation of running systems is of interest in a variety of situations, ranging from functional upgrades to on-the-fly debugging or monitoring of critical ...
David Röthlisberger, Marcus Denker, Ér...
CCR
2006
76views more  CCR 2006»
15 years 2 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato
137
Voted
GPEM
2006
97views more  GPEM 2006»
15 years 2 months ago
Evolving recursive programs by using adaptive grammar based genetic programming
Genetic programming (GP) extends traditional genetic algorithms to automatically induce computer programs. GP has been applied in a wide range of applications such as software ree...
Man Wong