Sciweavers

6102 search results - page 245 / 1221
» Generating Optimizing Specializers
Sort
View
USS
2008
15 years 5 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
129
Voted
BMCBI
2008
133views more  BMCBI 2008»
15 years 3 months ago
MS-DOCK: Accurate multiple conformation generator and rigid docking protocol for multi-step virtual ligand screening
Background: The number of protein targets with a known or predicted tri-dimensional structure and of drug-like chemical compounds is growing rapidly and so is the need for new the...
Nicolas Sauton, David Lagorce, Bruno O. Villoutrei...
123
Voted
TCSV
2010
14 years 10 months ago
A Hierarchical Bayesian Generation Framework for Vacant Parking Space Detection
In this paper, from the viewpoint of scene understanding, a 3-layer Bayesian hierarchical framework (BHF) is proposed for robust vacant parking space detection. In practice, the ch...
Chingchun Huang, Sheng-Jyh Wang
CODES
2007
IEEE
15 years 10 months ago
Smart driver for power reduction in next generation bistable electrophoretic display technology
Microencapsulated electrophoretic displays (EPDs) are quickly emerging as an important technology for use in battery-powered portable computing devices. Thanks to bistability and ...
Michael A. Baker, Aviral Shrivastava, Karam S. Cha...
148
Voted
EUROCRYPT
2004
Springer
15 years 9 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer