Sciweavers

1081 search results - page 54 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
CCS
2009
ACM
14 years 22 days ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
SAC
2011
ACM
12 years 11 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
WWW
2004
ACM
14 years 9 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
COMPSAC
2009
IEEE
14 years 3 hour ago
Toward Middleware-Based Online Application Migration
—As an effective approach to maintain software system without interrupting the service, online migration has been applied for many goals, e.g. achieving a higher system performan...
Fang Deng, Qianxiang Wang, Jin Shao
IJCAI
2007
13 years 10 months ago
Towards Reasoning about the Past in Neural-symbolic Systems
Reasoning about the past is of fundamental importance in several applications in computer science and artificial intelligence, including reactive systems and planning. In this pa...
Rafael V. Borges, Luís C. Lamb, Artur S. d'...