Sciweavers

1340 search results - page 54 / 268
» JWARS output analysis
Sort
View
137
Voted
SOFSEM
2009
Springer
16 years 20 days ago
When Analysis Fails: Heuristic Mechanism Design via Self-correcting Procedures
Abstract. Computational mechanism design (CMD) seeks to understand how to design game forms that induce desirable outcomes in multiagent systems despite private information, self-i...
David C. Parkes
ACSAC
2007
IEEE
15 years 10 months ago
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection
With the recent rapid increase in interactive web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats....
Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hish...
131
Voted
ICCCN
2007
IEEE
15 years 10 months ago
Delay Analysis of Combined Input-Crosspoint Queueing Switches
Abstract— The switch architecture with the combined inputcrosspoint queueing (CICQ) scheme has been recognized as a practical promising solution for building cost-effective highp...
Ge Nong, Ning Situ, Mounir Hamdi
183
Voted
NDSS
2007
IEEE
15 years 10 months ago
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected into the output of an application that is then sent to a user’s web browser....
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, E...
125
Voted
BERTINORO
2005
Springer
15 years 9 months ago
Design and Analysis of a Bio-inspired Search Algorithm for Peer to Peer Networks
Decentralized peer to peer (p2p) networks like Gnutella are attractive for certain applications because they require no centralized directories and no precise control over network ...
Niloy Ganguly, Lutz Brusch, Andreas Deutsch