Sciweavers

1748 search results - page 298 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
GG
2008
Springer
15 years 2 months ago
Workshop on Graph Computation Models
A variety of computation models have been developed using graphs and graph transformations. These include models for sequential, distributed, parallel or mobile computation. A grap...
Mohamed Mosbah, Annegret Habel
110
Voted
SIGCSE
2008
ACM
155views Education» more  SIGCSE 2008»
15 years 1 months ago
Towards a top-down approach to teaching an undergraduate grid computing course
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web an...
Barry Wilkinson, Clayton Ferner
94
Voted
ICSE
2005
IEEE-ACM
16 years 1 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
15 years 7 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
ASPLOS
1998
ACM
15 years 6 months ago
A Cost-Effective, High-Bandwidth Storage Architecture
This paper describes the Network-Attached Secure Disk (NASD) storage architecture, prototype implementations of NASD drives, array management for our architecture, and three files...
Garth A. Gibson, David Nagle, Khalil Amiri, Jeff B...