Sciweavers

249 search results - page 35 / 50
» Security of open source web applications
Sort
View
JIB
2007
119views more  JIB 2007»
14 years 9 months ago
VINEdb: a data warehouse for integration and interactive exploration of life science data
Control of cell proliferation, differentiation, activation and cell removal is crucial for the development and existence of multi-cellular organisms. Apoptosis, or programmed cell...
Sridhar Hariharaputran, Thoralf Töpel, Bj&oum...
107
Voted
TPLP
2002
99views more  TPLP 2002»
14 years 9 months ago
Using Methods of Declarative Logic Programming for Intelligent Information Agents
At present, the search for specific information on the World Wide Web is faced with several problems, which arise on the one hand from the vast number of information sources avail...
Thomas Eiter, Michael Fink, Giuliana Sabbatini, Ha...
SAC
2004
ACM
15 years 2 months ago
Knowledge-based conversational agents and virtual storytelling
Abstract. We describe an architecture for building speech-enabled conversational agents, deployed as self-contained Web services, with ability to provide inference processing on ve...
Paul Tarau, Elizabeth Figa
94
Voted
ACSAC
2004
IEEE
15 years 1 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
CCS
2011
ACM
13 years 9 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg