Sciweavers

906 search results - page 71 / 182
» Controlling Control Flow in Web Applications
Sort
View
COMPSAC
2003
IEEE
14 years 2 months ago
PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications
Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm mo...
Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I-Ling Ye...
DAC
2004
ACM
14 years 9 months ago
Characterizing embedded applications for instruction-set extensible processors
Extensible processors, which allow customization for an application domain by extending the core instruction set architecture, are becoming increasingly popular for embedded syste...
Pan Yu, Tulika Mitra
RSEISP
2007
Springer
14 years 2 months ago
Web-Based Support Systems with Rough Set Analysis
Abstract. Rough sets have been applied to many areas where multiattribute data is needed to be analyzed to acquire knowledge for decision making. Web-based Support Systems (WSS) ar...
Jingtao Yao, Joseph P. Herbert
DATE
2000
IEEE
121views Hardware» more  DATE 2000»
14 years 1 months ago
Composite Signal Flow: A Computational Model Combining Events, Sampled Streams, and Vectors
The composite signal flow model of computation targets systems with significant control and data processing parts. It builds on the data flow and synchronous data flow models ...
Axel Jantsch, Per Bjuréus
CCS
2010
ACM
13 years 9 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster