Sciweavers

1943 search results - page 315 / 389
» Web application security engineering
Sort
View
ECR
2002
160views more  ECR 2002»
15 years 2 months ago
A New Micro-Payment System Using General Payword Chain
In recent years electronic commerce has grown rapidly as Internet and web technologies have progressed. Therefore, a secure and efficient payment system for general-purpose applic...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
CIKM
2009
Springer
15 years 9 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau
GECCO
2009
Springer
191views Optimization» more  GECCO 2009»
15 years 9 months ago
Evolvable malware
The concept of artificial evolution has been applied to numerous real world applications in different domains. In this paper, we use this concept in the domain of virology to ev...
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Mu...
NETGAMES
2006
ACM
15 years 9 months ago
Peer clustering: a hybrid approach to distributed virtual environments
This paper proposes a hybrid architecture for distributed virtual environments, utilizing servers alongside peer-to-peer components. Current research into peer-based systems seeks...
Alvin Chen, Richard R. Muntz
OOPSLA
2001
Springer
15 years 7 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder