Sciweavers

7811 search results - page 1490 / 1563
» computing 2004
Sort
View
SIGSOFT
2004
ACM
16 years 3 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek
ISBI
2004
IEEE
16 years 3 months ago
A Unified Feature-Based Registration Method for Multimodality Images
While mutual information-based methods have become popular for image registration, the question of what underlying feature to use is rarely discussed. Instead, it is implicitly as...
Jie Zhang, Anand Rangarajan
WWW
2004
ACM
16 years 3 months ago
RDFPeers: a scalable distributed RDF repository based on a structured peer-to-peer network
Centralized Resource Description Framework (RDF) repositories have limitations both in their failure tolerance and in their scalability. Existing Peer-to-Peer (P2P) RDF repositori...
Min Cai, Martin R. Frank
148
Voted
WWW
2004
ACM
16 years 3 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
WWW
2004
ACM
16 years 3 months ago
Anti-aliasing on the web
It is increasingly common for users to interact with the web using a number of different aliases. This trend is a doubleedged sword. On one hand, it is a fundamental building bloc...
Jasmine Novak, Prabhakar Raghavan, Andrew Tomkins
« Prev « First page 1490 / 1563 Last » Next »