Sciweavers

12697 search results - page 2292 / 2540
» Call for Papers
Sort
View
103
Voted
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
15 years 7 months ago
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
Web applications are ubiquitous, perform missioncritical tasks, and handle sensitive user data. Unfortunately, web applications are often implemented by developers with limited se...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
125
Voted
WCNC
2008
IEEE
15 years 7 months ago
WiFlex: Multi-Channel Cooperative Protocols for Heterogeneous Wireless Devices
—1 In ISM bands, many wireless protocols proliferate such as 802.11, Bluetooth, and ZigBee. However, these incompatible protocols create complex coexistence and connectivity prob...
Jiwoong Lee, Jeonghoon Mo, Tran Minh Trung, Jean C...
99
Voted
AIMSA
2008
Springer
15 years 7 months ago
Using Text Segmentation to Enhance the Cluster Hypothesis
An alternative way to tackle Information Retrieval, called Passage Retrieval, considers text fragments independently rather than assessing global relevance of documents. In such a ...
Sylvain Lamprier, Tassadit Amghar, Bernard Levrat,...
109
Voted
ACSAC
2007
IEEE
15 years 7 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
111
Voted
ACSC
2007
IEEE
15 years 7 months ago
Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol
Wireless Mesh Networks (WMNs) have recently gained increasing attention and have emerged as a technology with great potential for a wide range of applications. WMNs can be conside...
Asad Amir Pirzada, Marius Portmann, Jadwiga Induls...
« Prev « First page 2292 / 2540 Last » Next »