Sciweavers

651 search results - page 127 / 131
» Structured Types and Separation Logic
Sort
View
259
Voted
POPL
2006
ACM
16 years 3 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
116
Voted
IWNAS
2008
IEEE
15 years 9 months ago
POND: The Power of Zone Overlapping in DHT Networks
— Distributed Hash Table (DHT) based algorithms have been proposed to solve the routing issues in large-scale Peer-to-Peer (P2P) applications. DHT systems create an elegant Peer-...
Zhiyong Xu, Jizhong Han, Laxmi N. Bhuyan
94
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Answering conceptual queries with Ferret
Programmers seek to answer questions as they investigate the functioning of a software system, such as "which execution path is being taken in this case?" Programmers at...
Brian de Alwis, Gail C. Murphy
121
Voted
CVPR
2007
IEEE
15 years 9 months ago
Estimating Cluster Overlap on Manifolds and its Application to Neuropsychiatric Disorders
Although it is usually assumed in many pattern recognition problems that different patterns are distinguishable, some patterns may have inseparable overlap. For example, some faci...
Peng Wang, Christian Köhler, Ragini Verma
117
Voted
SIGIR
2003
ACM
15 years 8 months ago
ReCoM: reinforcement clustering of multi-type interrelated data objects
Most existing clustering algorithms cluster highly related data objects such as Web pages and Web users separately. The interrelation among different types of data objects is eith...
Jidong Wang, Hua-Jun Zeng, Zheng Chen, Hongjun Lu,...