Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
We propose a novel object discovery framework integrating the application layer of Bluetooth and RFID standards. The approach is motivated and illustrated in an innovative u-comme...
Tommaso Di Noia, Eugenio Di Sciascio, Francesco M....
Virtual machine distributed computing greatly simplifies the use of widespread computing resources by lowering the abstraction, benefiting both resource providers and users. Tow...
Ananth I. Sundararaj, Ashish Gupta, Peter A. Dinda
M-commerce is one of the ways IT can significantly contribute to boosting economy of the developing countries. M-commerce project has a high potential in the developing countries ...
Olga Yugay, Aleksey Semyonov, Il Seok Ko, Sarvar R...
With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running distributed services that interact with other resources on the Web. The CoDeeN C...
Limin Wang, KyoungSoo Park, Ruoming Pang, Vivek S....