Sciweavers

1235 search results - page 224 / 247
» Formalizing information security knowledge
Sort
View
ISSTA
2012
ACM
11 years 10 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
ICIW
2009
IEEE
14 years 2 months ago
Towards a Disciplined Engineering of Adaptive Service-Oriented Business Processes
Today’s cross-organizations are increasingly coordinating their capabilities in the quest of dynamically adaptable and thus highly competitive realistic services. Unfortunately,...
Nasreddine Aoumeur, Kamel Barkaoui
SSDBM
2010
IEEE
308views Database» more  SSDBM 2010»
14 years 22 days ago
Provenance Context Entity (PaCE): Scalable Provenance Tracking for Scientific RDF Data
The Resource Description Framework (RDF) format is being used by a large number of scientific applications to store and disseminate their datasets. The provenance information, desc...
Satya Sanket Sahoo, Olivier Bodenreider, Pascal Hi...
SAS
2001
Springer
166views Formal Methods» more  SAS 2001»
14 years 2 days ago
Estimating the Impact of Scalable Pointer Analysis on Optimization
This paper addresses the following question: Do scalable control-flow-insensitive pointer analyses provide the level of precision required to make them useful in compiler optimiza...
Manuvir Das, Ben Liblit, Manuel Fähndrich, Ja...
IJCAI
1989
13 years 8 months ago
A Critique of the Valiant Model
This paper considers the Valiant framework as it is applied to the task of learning logical concepts from random examples. It is argued that the current interpretation of this Val...
Wray L. Buntine