Sciweavers

3561 search results - page 625 / 713
» Design: One, but in different forms
Sort
View
DIMVA
2008
13 years 10 months ago
Data Space Randomization
Over the past several years, US-CERT advisories, as well as most critical updates from software vendors, have been due to memory corruption vulnerabilities such as buffer overflo...
Sandeep Bhatkar, R. Sekar
APLAS
2010
ACM
13 years 9 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
SIGMOD
2010
ACM
232views Database» more  SIGMOD 2010»
13 years 9 months ago
Optimizing content freshness of relations extracted from the web using keyword search
An increasing number of applications operate on data obtained from the Web. These applications typically maintain local copies of the web data to avoid network latency in data acc...
Mohan Yang, Haixun Wang, Lipyeow Lim, Min Wang
BMCBI
2007
112views more  BMCBI 2007»
13 years 9 months ago
PFAAT version 2.0: A tool for editing, annotating, and analyzing multiple sequence alignments
Background: By virtue of their shared ancestry, homologous sequences are similar in their structure and function. Consequently, multiple sequence alignments are routinely used to ...
Daniel R. Caffrey, Paul H. Dana, Vidhya Mathur, Ma...
BMCBI
2008
116views more  BMCBI 2008»
13 years 9 months ago
Gene Ontology annotations: what they mean and where they come from
To address the challenges of information integration and retrieval, the computational genomics community increasingly has come to rely on the methodology of creating annotations o...
David P. Hill, Barry Smith, Monica S. McAndrews-Hi...