Sciweavers

515 search results - page 82 / 103
» Measuring Voter-Controlled Privacy
Sort
View
WWW
2004
ACM
14 years 10 months ago
Filtering spam e-mail on a global scale
In this paper we analyze a very large junk e-mail corpus which was generated by a hundred thousand volunteer users of the Hotmail e-mail service. We describe how the corpus is bei...
Geoff Hulten, Joshua T. Goodman, Robert Rounthwait...
ICHIT
2009
Springer
14 years 4 months ago
Using w3af to achieve automated penetration testing by live DVD/live USB
As the popularity of the Internet continues growing, there are more and more services appeared, security measures are expected to become all the most important on the Internet. Pe...
Jiun-Kai Ke, Chung-Huang Yang, Tae-Nam Ahn
OOPSLA
2007
Springer
14 years 4 months ago
The JastAdd extensible Java compiler
We have implemented intraprocedural control-flow and data-flow analysis of Java source code in a declarative manner, using reference attribute grammars augmented with circular a...
Torbjörn Ekman, Görel Hedin
OOPSLA
2007
Springer
14 years 4 months ago
DigitalAssets discoverer: automatic identification of reusable software components
DigitalAssets Discoverer is a tool that implements a group of indicators for automatic identification of software components that can be reused in the development of new applicati...
Eduardo Machado Gonçalves, Marcilio Silva O...
OOPSLA
2007
Springer
14 years 4 months ago
The JikesXen Java server platform
ose of the JVM is to abstract the Java language from the hardware and software platforms it runs on. For this reason, the JVM uses services offered by the host operating system in...
Georgios Gousios