Sciweavers

1585 search results - page 93 / 317
» Automatically optimizing secure computation
Sort
View
MIDDLEWARE
2007
Springer
14 years 2 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
SSR
2001
104views more  SSR 2001»
13 years 9 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
ICMS
2010
13 years 6 months ago
The Reformulation-Optimization Software Engine
Abstract. Most optimization software performs numerical computation, in the sense that the main interest is to find numerical values to assign to the decision variables, e.g. a so...
Leo Liberti, Sonia Cafieri, David Savourey
SOUPS
2005
ACM
14 years 1 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
ISMIR
2005
Springer
141views Music» more  ISMIR 2005»
14 years 1 months ago
Rhythm-Based Segmentation of Popular Chinese Music
We present a new method to segment popular music based on rhythm. By computing a shortest path based on the self-similarity matrix calculated from a model of rhythm, segmenting bo...
Kristoffer Jensen, Jieping Xu, Martin Zachariasen