Sciweavers

249 search results - page 35 / 50
» Security of open source web applications
Sort
View
JIB
2007
119views more  JIB 2007»
13 years 8 months ago
VINEdb: a data warehouse for integration and interactive exploration of life science data
Control of cell proliferation, differentiation, activation and cell removal is crucial for the development and existence of multi-cellular organisms. Apoptosis, or programmed cell...
Sridhar Hariharaputran, Thoralf Töpel, Bj&oum...
TPLP
2002
99views more  TPLP 2002»
13 years 8 months ago
Using Methods of Declarative Logic Programming for Intelligent Information Agents
At present, the search for specific information on the World Wide Web is faced with several problems, which arise on the one hand from the vast number of information sources avail...
Thomas Eiter, Michael Fink, Giuliana Sabbatini, Ha...
SAC
2004
ACM
14 years 1 months ago
Knowledge-based conversational agents and virtual storytelling
Abstract. We describe an architecture for building speech-enabled conversational agents, deployed as self-contained Web services, with ability to provide inference processing on ve...
Paul Tarau, Elizabeth Figa
ACSAC
2004
IEEE
14 years 7 days ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
CCS
2011
ACM
12 years 8 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg