Sciweavers

32 search results - page 6 / 7
» Practical Experience with an Application Extractor for Java
Sort
View
SIGSOFT
2009
ACM
14 years 8 months ago
Asserting and checking determinism for multithreaded programs
The trend towards processors with more and more parallel cores is increasing the need for software that can take advantage of parallelism. The most widespread method for writing p...
Jacob Burnim, Koushik Sen
ACSAC
2010
IEEE
13 years 5 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
BMCBI
2008
136views more  BMCBI 2008»
13 years 7 months ago
An efficient method for the prediction of deleterious multiple-point mutations in the secondary structure of RNAs using suboptim
Background: RNAmute is an interactive Java application which, given an RNA sequence, calculates the secondary structure of all single point mutations and organizes them into categ...
Alexander Churkin, Danny Barash
GIS
1999
ACM
13 years 11 months ago
Integrating GPS Data Within Embedded Internet GIS
In this paper we investigate the development of an embedded and mobile geographic information system. Its main characteristics concern the possibility to access various informatio...
Arunas Stockus, Alain Bouju, Frédéri...
ATAL
2006
Springer
13 years 9 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate