Sciweavers

6300 search results - page 298 / 1260
» We have it easy, but do we have it right
Sort
View
WWW
2006
ACM
16 years 2 months ago
SecuBat: a web vulnerability scanner
As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been gaining importance as well. The last years have shown a...
Christopher Krügel, Engin Kirda, Nenad Jovano...
PLDI
2006
ACM
15 years 7 months ago
Practical dynamic software updating for C
Software updates typically require stopping and restarting an application, but many systems cannot afford to halt service, or would prefer not to. Dynamic software updating (DSU) ...
Iulian Neamtiu, Michael W. Hicks, Gareth Stoyle, M...
CSL
2009
Springer
15 years 5 months ago
Fixed-Point Definability and Polynomial Time
My talk will be a survey of recent results about the quest for a logic capturing polynomial time. In a fundamental study of database query languages, Chandra and Harel [4] first ra...
Martin Grohe
ASAP
2010
IEEE
171views Hardware» more  ASAP 2010»
15 years 2 months ago
General-purpose FPGA platform for efficient encryption and hashing
Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can b...
Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee
124
Voted
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 8 months ago
Reputation-Based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks
— In a mobile ad hoc network, node cooperation in packet forwarding is required for the network to function properly. However, since nodes in this network usually have limited re...
Tiranuch Anantvalee, Jie Wu