Sciweavers

1748 search results - page 193 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
124
Voted
VR
2002
IEEE
117views Virtual Reality» more  VR 2002»
15 years 7 months ago
DLoVe: Using Constraints to Allow Parallel Processing in Multi-User Virtual Reality
In this paper, we introduce DLoVe, a new paradigm for designing and implementing distributed and nondistributed virtual reality applications, using one-way constraints. DLoVe allo...
Leonidas Deligiannidis, Robert J. K. Jacob
142
Voted
GECCO
2006
Springer
181views Optimization» more  GECCO 2006»
15 years 6 months ago
Designing safe, profitable automated stock trading agents using evolutionary algorithms
Trading rules are widely used by practitioners as an effective means to mechanize aspects of their reasoning about stock price trends. However, due to the simplicity of these rule...
Harish Subramanian, Subramanian Ramamoorthy, Peter...
122
Voted
DISCEX
2003
IEEE
15 years 8 months ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
114
Voted
IPPS
2009
IEEE
15 years 9 months ago
Ibis: Real-world problem solving using real-world grids
Ibis is an open source software framework that drastically simplifies the process of programming and deploying large-scale parallel and distributed grid applications. Ibis suppor...
Henri E. Bal, Niels Drost, Roelof Kemp, Jason Maas...
115
Voted
ACSAC
2005
IEEE
15 years 8 months ago
Dynamic Taint Propagation for Java
Improperly validated user input is the underlying root cause for a wide variety of attacks on web-based applications. Static approaches for detecting this problem help at the time...
Vivek Haldar, Deepak Chandra, Michael Franz