Sciweavers

551 search results - page 49 / 111
» Preventing existence
Sort
View
ESORICS
2009
Springer
16 years 14 days ago
Client-Side Detection of XSS Worms by Monitoring Payload Propagation
Cross-site scripting (XSS) vulnerabilities make it possible for worms to spread quickly to a broad range of users on popular Web sites. To date, the detection of XSS worms has been...
Fangqi Sun, Liang Xu, Zhendong Su
HPCA
2007
IEEE
16 years 7 days ago
A Burst Scheduling Access Reordering Mechanism
Utilizing the nonuniform latencies of SDRAM devices, access reordering mechanisms alter the sequence of main memory access streams to reduce the observed access latency. Using a r...
Jun Shao, Brian T. Davis
EDBT
2006
ACM
118views Database» more  EDBT 2006»
15 years 12 months ago
On Honesty in Sovereign Information Sharing
Abstract. We study the following problem in a sovereign informationsharing setting: How to ensure that the individual participants, driven solely by self-interest, will behave hone...
Rakesh Agrawal, Evimaria Terzi
ICIAP
2005
ACM
15 years 12 months ago
Greedy Algorithm for Local Contrast Enhancement of Images
Abstract. We present a technique that achieves local contrast enhancement by representing it as an optimization problem. For this, we first introduce a scalar objective function th...
Kartic Subr, Aditi Majumder, Sandy Irani
MOBIHOC
2003
ACM
15 years 11 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong