Sciweavers

4178 search results - page 692 / 836
» Similarity Patterns in Language
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
134
Voted
CCS
2006
ACM
15 years 8 months ago
Puppetnets: misusing web browsers as a distributed attack infrastructure
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat ...
V. T. Lam, Spyros Antonatos, Periklis Akritidis, K...
GECCO
2006
Springer
198views Optimization» more  GECCO 2006»
15 years 8 months ago
Autonomous evolutionary music composer
A second-generation autonomous music composition tool is developed using Genetic Algorithms. The composition is conducted in two Stages. The first Stage generates and identifies m...
Yaser M. A. Khalifa, Mohamed Basel Al-Mourad
OOIS
2000
Springer
15 years 8 months ago
Architecture as Object Models of Software
ABSTRACT: Typically, we think of modelling some business domain when we see the word modelling in the context of software -- some business domain is not understood and therefore we...
Eyðun Eli Jacobsen
WEBDB
2000
Springer
110views Database» more  WEBDB 2000»
15 years 8 months ago
Modeling Data Entry and Operations in WebML
Web Modeling Language (WebML, http://webml.org) is a notation for visually specifying complex Web sites at the conceptual level. All the concepts of WebML are specified both graph...
Aldo Bongio, Stefano Ceri, Piero Fraternali, Andre...