Sciweavers

1765 search results - page 316 / 353
» Combinations of Weak Classifiers
Sort
View
ICSE
2008
IEEE-ACM
14 years 9 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
WWW
2005
ACM
14 years 9 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
PPOPP
2009
ACM
14 years 9 months ago
Transactional memory with strong atomicity using off-the-shelf memory protection hardware
This paper introduces a new way to provide strong atomicity in an implementation of transactional memory. Strong atomicity lets us offer clear semantics to programs, even if they ...
Martín Abadi, Tim Harris, Mojtaba Mehrara
CHI
2004
ACM
14 years 9 months ago
Measuring presence in virtual environments
The effectiveness of virtual environments (VEs) has often been linked to the sense of presence reported by users of those VEs. (Presence is defined as the subjective experience of...
Rod McCall, Shaleph O'Neill, Fiona Carroll
RECOMB
2005
Springer
14 years 9 months ago
Causal Inference of Regulator-Target Pairs by Gene Mapping of Expression Phenotypes
Background: Correlations between polymorphic markers and observed phenotypes provide the basis for mapping traits in quantitative genetics. When the phenotype is gene expression, ...
David Kulp, Manjunatha Jagalur