Sciweavers

4138 search results - page 827 / 828
» Design and implementation of a network simulation system
Sort
View
CCS
2008
ACM
13 years 8 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
BMCBI
2008
117views more  BMCBI 2008»
13 years 6 months ago
Using a logical model to predict the growth of yeast
Background: A logical model of the known metabolic processes in S. cerevisiae was constructed from iFF708, an existing Flux Balance Analysis (FBA) model, and augmented with inform...
Ken E. Whelan, Ross D. King
CORR
2007
Springer
146views Education» more  CORR 2007»
13 years 6 months ago
The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives
We conducted a preliminary field study to understand the current state of personal digital archiving in practice. Our aim is to design a service for the long-term storage, preserv...
Catherine C. Marshall, Sara A. Bly, Francoise Brun...
PVLDB
2011
12 years 9 months ago
Merging What's Cracked, Cracking What's Merged: Adaptive Indexing in Main-Memory Column-Stores
Adaptive indexing is characterized by the partial creation and refinement of the index as side effects of query execution. Dynamic or shifting workloads may benefit from prelimi...
Stratos Idreos, Stefan Manegold, Harumi A. Kuno, G...
GIS
2008
ACM
14 years 7 months ago
Geospatial information integration based on the conceptualization of geographic domain
Geospatial information integration is not a trivial task. An integrated view must be able to describe various heterogeneous data sources and its interrelation to obtain shared con...
Miguel Torres, Serguei Levachkine, Rolando Quinter...