Sciweavers

6102 search results - page 245 / 1221
» Generating Optimizing Specializers
Sort
View
USS
2008
15 years 3 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
103
Voted
BMCBI
2008
133views more  BMCBI 2008»
15 years 27 days ago
MS-DOCK: Accurate multiple conformation generator and rigid docking protocol for multi-step virtual ligand screening
Background: The number of protein targets with a known or predicted tri-dimensional structure and of drug-like chemical compounds is growing rapidly and so is the need for new the...
Nicolas Sauton, David Lagorce, Bruno O. Villoutrei...
98
Voted
TCSV
2010
14 years 7 months ago
A Hierarchical Bayesian Generation Framework for Vacant Parking Space Detection
In this paper, from the viewpoint of scene understanding, a 3-layer Bayesian hierarchical framework (BHF) is proposed for robust vacant parking space detection. In practice, the ch...
Chingchun Huang, Sheng-Jyh Wang
CODES
2007
IEEE
15 years 7 months ago
Smart driver for power reduction in next generation bistable electrophoretic display technology
Microencapsulated electrophoretic displays (EPDs) are quickly emerging as an important technology for use in battery-powered portable computing devices. Thanks to bistability and ...
Michael A. Baker, Aviral Shrivastava, Karam S. Cha...
122
Voted
EUROCRYPT
2004
Springer
15 years 6 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer