Sciweavers

103 search results - page 7 / 21
» Constructing malware normalizers using term rewriting
Sort
View
ICSE
2008
IEEE-ACM
15 years 10 months ago
Data flow testing of service-oriented workflow applications
WS-BPEL applications are a kind of service-oriented application. They use XPath extensively to integrate loosely-coupled workflow steps. However, XPath may extract wrong data from...
Lijun Mei, W. K. Chan, T. H. Tse
72
Voted
COMPIMAGE
2010
Springer
14 years 7 months ago
On the Effects of Normalization in Adaptive MRF Hierarchies
Abstract. In this paper, we analyze the effects of energy normalization in adaptivehierarchy-based energy minimization methods. Adaptive hierarchies provide a nt multi-level abstra...
Albert Y. C. Chen, Jason J. Corso
90
Voted
CORR
2004
Springer
107views Education» more  CORR 2004»
14 years 9 months ago
Encapsulation for Practical Simplification Procedures
ACL2 was used to prove properties of two simplification procedures. The procedures differ in complexity but solve the same programming problem that arises in the context of a reso...
Olga Shumsky Matlin, William McCune
CIKM
2004
Springer
15 years 2 months ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
ICNP
1998
IEEE
15 years 1 months ago
Distributed Packet Rewriting and its Application to Scalable Server Architectures
To construct high performance Web servers, system builders are increasingly turning to distributed designs. An important challenge that arises in such designs is the need to direc...
Azer Bestavros, Mark Crovella, Jun Liu, David Mart...