Sciweavers

599 search results - page 112 / 120
» Integrating answer set programming and constraint logic prog...
Sort
View
PLDI
2009
ACM
15 years 10 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
CIA
2006
Springer
15 years 7 months ago
Market-Inspired Approach to Collaborative Learning
The paper describes a decentralized peer-to-peer multi-agent learning method based on inductive logic programming and knowledge trading. The method uses first-order logic for model...
Jan Tozicka, Michal Jakob, Michal Pechoucek
ICWS
2008
IEEE
15 years 4 months ago
Dynamic Exception Handling Based on Web Services and OPC XML-DA
Programmable Logic Controllers (PLC) are widely used in process automation due to their fast and guarantee response time. However their programming and interfacing capacities are ...
Francisco Javier Díez, Iñaki Maurtua
130
Voted
WWW
2004
ACM
16 years 4 months ago
Semantic email
This paper investigates how the vision of the Semantic Web can be carried over to the realm of email. We introduce a general notion of semantic email, in which an email message co...
Luke McDowell, Oren Etzioni, Alon Y. Halevy, Henry...
139
Voted
ICISS
2010
Springer
15 years 1 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...