Sciweavers

46 search results - page 8 / 10
» Rethinking Java strings
Sort
View
DIMVA
2009
13 years 7 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
BIOINFORMATICS
2004
83views more  BIOINFORMATICS 2004»
13 years 6 months ago
Haplotypes histories as pathways of recombinations
Motivation: The diversity of a haplotype, represented as a string of polymorphic sites along a DNA sequence, increases exponentially with the number of sites if recombinations are...
Nadia El-Mabrouk, Damian Labuda
GPCE
2009
Springer
13 years 4 months ago
Generating safe template languages
Template languages are widely used within generative programming, because they provide intuitive means to generate software artefacts expressed in a specific object language. Howe...
Florian Heidenreich, Jendrik Johannes, Mirko Seife...
BMCBI
2007
124views more  BMCBI 2007»
13 years 6 months ago
Protein structural similarity search by Ramachandran codes
Background: Protein structural data has increased exponentially, such that fast and accurate tools are necessary to access structure similarity search. To improve the search speed...
Wei-Cheng Lo, Po-Jung Huang, Chih-Hung Chang, Ping...
ICSE
2008
IEEE-ACM
14 years 7 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su