Sciweavers

191 search results - page 28 / 39
» Differentially secure multicasting and its implementation me...
Sort
View
BMCBI
2005
169views more  BMCBI 2005»
13 years 8 months ago
MAPPER: a search engine for the computational identification of putative transcription factor binding sites in multiple genomes
Background: Cis-regulatory modules are combinations of regulatory elements occurring in close proximity to each other that control the spatial and temporal expression of genes. Th...
Voichita D. Marinescu, Isaac S. Kohane, Alberto Ri...
CCS
2010
ACM
13 years 9 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
ESORICS
2005
Springer
14 years 2 months ago
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
The abstraction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently si...
Michael Backes, Birgit Pfitzmann
CCS
2008
ACM
13 years 10 months ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
OOPSLA
2009
Springer
14 years 3 months ago
Minimizing dependencies within generic classes for faster and smaller programs
Generic classes can be used to improve performance by allowing compile-time polymorphism. But the applicability of compile-time polymorphism is narrower than that of runtime polym...
Dan Tsafrir, Robert W. Wisniewski, David F. Bacon,...