Sciweavers

628 search results - page 117 / 126
» Effectively Open Real Functions
Sort
View
ICSE
2008
IEEE-ACM
16 years 15 days ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
SIGSOFT
2008
ACM
16 years 13 days ago
Extended exceptions for contingencies and their implications for the engineering process
We observed a general problem of sequential programs, which often results in design and programming errors in industrial software engineering projects, and propose a solution appr...
Thorsten van Ellen, Wilhelm Hasselbring
KDD
2005
ACM
161views Data Mining» more  KDD 2005»
16 years 2 days ago
Combining email models for false positive reduction
Machine learning and data mining can be effectively used to model, classify and discover interesting information for a wide variety of data including email. The Email Mining Toolk...
Shlomo Hershkop, Salvatore J. Stolfo
KDD
2002
ACM
170views Data Mining» more  KDD 2002»
16 years 2 days ago
On interactive visualization of high-dimensional data using the hyperbolic plane
: se the concept of visualizing general abstract data by intermediate projection into the hyperbolic space. Its favorable properties were reported earlier and led to the "hype...
Helge Ritter, Jörg A. Walter
CHI
2008
ACM
16 years 2 days ago
Activity-based prototyping of ubicomp applications for long-lived, everyday human activities
We designed an activity-based prototyping process realized in the ActivityDesigner system that combines the theoretical framework of Activity-Centered Design with traditional iter...
Yang Li, James A. Landay