Sciweavers

540 search results - page 66 / 108
» Exploiting the Combined Potential of Web Applications and We...
Sort
View
DIMVA
2009
13 years 8 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
EMNLP
2011
12 years 7 months ago
Watermarking the Outputs of Structured Prediction with an application in Statistical Machine Translation
We propose a general method to watermark and probabilistically identify the structured outputs of machine learning algorithms. Our method is robust to local editing operations and...
Ashish Venugopal, Jakob Uszkoreit, David Talbot, F...
DS
2001
158views Database» more  DS 2001»
13 years 9 months ago
Towards A Semantic Framework for Service Description
The rapid development of the Internet and of distributed computing has led to a proliferation of online service providers such as digital libraries, web information sources, electr...
Marlon Dumas, Justin O'Sullivan, Mitra Heravizadeh...
CONCURRENCY
2008
112views more  CONCURRENCY 2008»
13 years 7 months ago
Building and applying geographical information system Grids
: We discuss the development and application of Web Service-based Geographical Information System Grids. Following the WS-I+ approach of building Grids on Web Service standards, we...
Galip Aydin, Ahmet Sayar, Harshawardhan Gadgil, Me...
CCS
2011
ACM
12 years 7 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj