Sciweavers

747 search results - page 72 / 150
» Testing for tunneling opens
Sort
View
USS
2010
13 years 7 months ago
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context
Reverse Turing tests, or CAPTCHAs, have become an ubiquitous defense used to protect open Web resources from being exploited at scale. An effective CAPTCHA resists existing mechan...
Marti Motoyama, Kirill Levchenko, Chris Kanich, Da...
ACL
2011
13 years 1 months ago
Event Extraction as Dependency Parsing
Nested event structures are a common occurrence in both open domain and domain specific extraction tasks, e.g., a “crime” event can cause a “investigation” event, which c...
David McClosky, Mihai Surdeanu, Christopher D. Man...
CCS
2011
ACM
12 years 9 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
BMCBI
2006
97views more  BMCBI 2006»
13 years 9 months ago
REEF: searching REgionally Enriched Features in genomes
Background: In Eukaryotic genomes, different features including genes are not uniformly distributed. The integration of annotation information and genomic position of functional D...
Alessandro Coppe, Gian Antonio Danieli, Stefania B...
ICDE
2007
IEEE
114views Database» more  ICDE 2007»
14 years 11 months ago
Reverse Query Processing
Traditionally, query processing gets a query and a database instance as input and returns the result of the query for that particular database instance. Reverse query processing (...
Carsten Binnig, Donald Kossmann, Eric Lo