Sciweavers

140 search results - page 14 / 28
» TAJ: effective taint analysis of web applications
Sort
View
ICDE
2004
IEEE
115views Database» more  ICDE 2004»
14 years 8 months ago
Unordered Tree Mining with Applications to Phylogeny
Frequent structure mining (FSM) aims to discover and extract patterns frequently occurring in structural data, such as trees and graphs. FSM finds many applications in bioinformat...
Dennis Shasha, Jason Tsong-Li Wang, Sen Zhang
DSS
2002
139views more  DSS 2002»
13 years 6 months ago
CI Spider: a tool for competitive intelligence on the Web
Competitive Intelligence (CI) aims to monitor a firm's external environment for information relevant to its decision-making process. As an excellent information source, the I...
Hsinchun Chen, Michael Chau, Daniel Dajun Zeng
JCM
2007
123views more  JCM 2007»
13 years 6 months ago
Experimental Analysis of VoIP over Wireless Local Area Networks
—VoIP is a rapidly growing technology that enables the transport of voice over data networks such as the public Internet. VoIP became a viable alternative to the public switched ...
Abderrahmane Lakas, Mohammed Boulmalf
IHI
2010
186views Healthcare» more  IHI 2010»
13 years 1 months ago
Analysis of an online health social network
With the continued advances of Web 2.0, health-centered Online Social Networks (OSNs) are emerging to provide knowledge and support for those interested in managing their own heal...
Xiaoxiao Ma, Guanling Chen, Juntao Xiao
SAC
2010
ACM
14 years 1 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...