Sciweavers

19174 search results - page 3535 / 3835
» Computer Animation Techniques
Sort
View
SEMCO
2009
IEEE
15 years 12 months ago
An Algebraic Language for Semantic Data Integration on the Hidden Web
Semantic integration in the hidden Web is an emerging area of research where traditional assumptions do not always hold. Frequent changes, conflicts and the sheer size of the hid...
Shazzad Hosain, Hasan M. Jamil
NDSS
2009
IEEE
15 years 12 months ago
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
NDSS
2009
IEEE
15 years 12 months ago
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Yacin Nadji, Prateek Saxena, Dawn Song
ICST
2009
IEEE
15 years 11 months ago
Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles
It is challenging to test applications and functions for which the correct output for arbitrary input cannot be known in advance, e.g. some computational science or machine learni...
Christian Murphy, Kuang Shen, Gail E. Kaiser
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 11 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis
« Prev « First page 3535 / 3835 Last » Next »