Sciweavers

69 search results - page 8 / 14
» Exploiting dynamicity in graph-based traffic analysis: techn...
Sort
View
IEEEPACT
2008
IEEE
14 years 1 months ago
Multi-mode energy management for multi-tier server clusters
This paper presents an energy management policy for reconfigurable clusters running a multi-tier application, exploiting DVS together with multiple sleep states. We develop a the...
Tibor Horvath, Kevin Skadron
EXPCS
2007
13 years 11 months ago
Analysis of input-dependent program behavior using active profiling
Utility programs, which perform similar and largely independent operations on a sequence of inputs, include such common applications as compilers, interpreters, and document parse...
Xipeng Shen, Michael L. Scott, Chengliang Zhang, S...
IEEECIT
2006
IEEE
14 years 1 months ago
One Update for all Moving Objects at a Timestamp
Concurrently with fast development of location aware technologies, many applications have been developing to exploit location data for serving people. However, a main challenge in...
Hoang Do Thanh Tung, Keun Ho Ryu
ICSE
2009
IEEE-ACM
14 years 2 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
CC
2005
Springer
153views System Software» more  CC 2005»
14 years 29 days ago
Completeness Analysis for Incomplete Object-Oriented Programs
We introduce a new approach, called completeness analysis, to computing points-to sets for incomplete Java programs such as library modules or applications in the presence of dynam...
Jingling Xue, Phung Hua Nguyen