Sciweavers

1575 search results - page 301 / 315
» The provenance of electronic data
Sort
View
SIGSOFT
2004
ACM
14 years 10 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek
WWW
2009
ACM
14 years 10 months ago
Analyzing seller practices in a Brazilian marketplace
E-commerce is growing at an exponential rate. In the last decade, there has been an explosion of online commercial activity enabled by World Wide Web (WWW). These days, many consu...
Adriano M. Pereira, Diego Duarte, Paulo Góe...
WWW
2004
ACM
14 years 10 months ago
Semantic email
This paper investigates how the vision of the Semantic Web can be carried over to the realm of email. We introduce a general notion of semantic email, in which an email message co...
Luke McDowell, Oren Etzioni, Alon Y. Halevy, Henry...
WWW
2003
ACM
14 years 10 months ago
Evaluating SOAP for High Performance Business Applications: Real-Time Trading Systems
Web services, with an emphasis on open standards and flexibility, may provide benefits over existing capital markets integration practices. However, web services must first meet c...
Christopher Kohlhoff, Robert Steele
MOBISYS
2004
ACM
14 years 9 months ago
Mimic: Raw Activity Shipping for File Synchronization in Mobile File Systems
In this paper, we consider the problem of file synchronization when a mobile host shares files with a backbone file server in a network file system. Several diff schemes have been...
Tae-Young Chang, Aravind Velayutham, Raghupathy Si...