Sciweavers

1851 search results - page 256 / 371
» Open Source AI
Sort
View
108
Voted
WWW
2010
ACM
15 years 10 months ago
Regular expressions considered harmful in client-side XSS filters
Cross-site scripting flaws have now surpassed buffer overflows as the world’s most common publicly-reported security vulnerability. In recent years, browser vendors and resea...
Daniel Bates, Adam Barth, Collin Jackson
107
Voted
CHI
2010
ACM
15 years 10 months ago
Communicating software agreement content using narrative pictograms
This paper presents narrative pictograms, diagrams designed to convey the abstract concepts of a software agreement. Narrative pictograms arose out of a need to increase the chanc...
Matthew Kay, Michael Terry
ESSOS
2010
Springer
15 years 10 months ago
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks
Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
Ben H. Smith, Laurie Williams, Andrew Austin
ACSC
2009
IEEE
15 years 10 months ago
Evaluating the dynamic behaviour of Python applications
The Python programming language is typical among dynamic languages in that programs written in it are not susceptible to static analysis. This makes efficient static program compi...
Alex Holkner, James Harland
166
Voted
BIBM
2009
IEEE
151views Bioinformatics» more  BIBM 2009»
15 years 10 months ago
Detection of Gene Orthology Based on Protein-Protein Interaction Networks
Abstract—Ortholog detection methods present a powerful approach for finding genes that participate in similar biological processes across different organisms, extending our unde...
Fadi Towfic, M. Heather West Greenlee, Vasant Hona...