Sciweavers

13866 search results - page 2671 / 2774
» Dynamical Systems Game
Sort
View
153
Voted
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
15 years 2 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
187
Voted
USS
2010
15 years 2 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
WEBI
2010
Springer
15 years 2 months ago
Incorporating Seasonality into Search Suggestions Derived from Intranet Query Logs
While much research has been performed on query logs collected for major Web search engines, query log analysis to enhance search on smaller and more focused collections has attrac...
Stephen Dignum, Udo Kruschwitz, Maria Fasli, Yunhy...
CCGRID
2009
IEEE
15 years 2 months ago
A Live Storage Migration Mechanism over WAN for Relocatable Virtual Machine Services on Clouds
IaaS (Infrastructure-as-a-Service) is an emerging concept of cloud computing, which allows users to obtain hardware resources from virtualized datacenters. Although many commercial...
Takahiro Hirofuchi, Hirotaka Ogawa, Hidemoto Nakad...
IJSSE
2010
80views more  IJSSE 2010»
15 years 1 months ago
Improving Memory Management Security for C and C++
Memory managers are an important part of any modern language: they are used to dynamically allocate memory for use in the program. Many managers exist and depending on the operati...
Yves Younan, Wouter Joosen, Frank Piessens, Hans V...
« Prev « First page 2671 / 2774 Last » Next »