Sciweavers

1587 search results - page 254 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
SIGCOMM
2006
ACM
15 years 3 months ago
Algorithms to accelerate multiple regular expressions matching for deep packet inspection
There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most...
Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patr...
SIGSOFT
2003
ACM
15 years 10 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
SIGECOM
2000
ACM
147views ECommerce» more  SIGECOM 2000»
15 years 2 months ago
MultECommerce: a distributed architecture for collaborative shopping on the WWW
The WWW has made information and services more available than ever before. Many of the first Web applications have been emulations of real world activities, in particular, e-comme...
Stefano Puglia, Robert Carter, Ravi Jain
VIS
2007
IEEE
164views Visualization» more  VIS 2007»
15 years 11 months ago
Contextualized Videos: Combining Videos with Environment Models to Support Situational Understanding
Multiple spatially-related videos are increasingly used in security, communication, and other applications. Since it can be difficult to understand the spatial relationships betwee...
Yi Wang, David A. Krum, Enylton M. Coelho, Doug...
ACMSE
2004
ACM
15 years 3 months ago
Role of the resource broker in the Grid
Today, as Grid Computing is becoming a reality, there is a need for managing and monitoring the available resources worldwide, as well as the need for conveying these resources to...
Enis Afgan