Sciweavers

325 search results - page 52 / 65
» Rewriting Strategies in Java
Sort
View
JSW
2007
133views more  JSW 2007»
13 years 7 months ago
New Functions for Unsupervised Asymmetrical Paraphrase Detection
Abstract— Monolingual text-to-text generation is an emerging research area in Natural Language Processing. One reason for the interest in such generation systems is the possibili...
João Cordeiro, Gaël Dias, Pavel Brazdi...
CCS
2009
ACM
14 years 7 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
POPL
2006
ACM
14 years 7 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
HPDC
1999
IEEE
13 years 11 months ago
Process Hijacking
Process checkpointing is a basic mechanism required for providing High Throughput Computing service on distributively owned resources. We present a new process checkpoint and migr...
Victor C. Zandy, Barton P. Miller, Miron Livny
BMCBI
2007
100views more  BMCBI 2007»
13 years 7 months ago
SBMLeditor: effective creation of models in the Systems Biology Markup Language (SBML)
Background: The need to build a tool to facilitate the quick creation and editing of models encoded in the Systems Biology Markup language (SBML) has been growing with the number ...
Nicolas Rodriguez, Marco Donizelli, Nicolas Le Nov...