Sciweavers

133 search results - page 16 / 27
» Modeling Request Routing in Web Applications
Sort
View
CSFW
2012
IEEE
11 years 10 months ago
Discovering Concrete Attacks on Website Authorization by Formal Analysis
—Social sign-on and social sharing are becoming an ever more popular feature of web applications. This success is largely due to the APIs and support offered by prominent social ...
Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffe...
ICML
1997
IEEE
14 years 8 months ago
Predicting Multiprocessor Memory Access Patterns with Learning Models
Machine learning techniques are applicable to computer system optimization. We show that shared memory multiprocessors can successfully utilize machine learning algorithms for mem...
M. F. Sakr, Steven P. Levitan, Donald M. Chiarulli...
BMCBI
2005
120views more  BMCBI 2005»
13 years 7 months ago
SpectralNET - an application for spectral graph analysis and visualization
Background: Graph theory provides a computational framework for modeling a variety of datasets including those emerging from genomics, proteomics, and chemical genetics. Networks ...
Joshua J. Forman, Paul A. Clemons, Stuart L. Schre...
USS
2008
13 years 10 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
ADAEUROPE
2004
Springer
14 years 1 months ago
PolyORB: A Schizophrenic Middleware to Build Versatile Reliable Distributed Applications
Abstract. The development of real-time distributed applications requires middleware providing both reliability and performance. Middleware must be adaptable to meet application req...
Thomas Vergnaud, Jérôme Hugues, Laure...