Sciweavers

2435 search results - page 437 / 487
» GPSS - 40 years of development
Sort
View
CCS
2005
ACM
14 years 4 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
CEAS
2005
Springer
14 years 4 months ago
Experiences with Greylisting
Greylisting temporarily rejects mail from unknown sources on the theory that real mailers will retry while spamware won’t. I outline a taxonomy of greylisters and report some st...
John R. Levine
CICLING
2005
Springer
14 years 4 months ago
The UNL Initiative: An Overview
We are presenting a description of the UNL initiative based on the Universal Networking Language (UNL). This language was conceived to be the support of the multilingual communicat...
Igor Boguslavsky, Jesús Cardeñosa, C...
COMPLIFE
2005
Springer
14 years 4 months ago
Fast and Accurate Structural RNA Alignment by Progressive Lagrangian Optimization
During the last few years new functionalities of RNA have been discovered, renewing the need for computational tools for their analysis. To this respect, multiple sequence alignmen...
Markus Bauer, Gunnar W. Klau, Knut Reinert
DIGRA
2005
Springer
14 years 4 months ago
Virtually Visual: The effects of visual technologies on online identification
Identification is regarded as an important aspect of beneficial online interaction. In addition to providing the individual with potential psychological benefits, identification w...
Jennifer Martin