Sciweavers

452 search results - page 51 / 91
» Turn Management or Impression Management
Sort
View
CCS
2008
ACM
13 years 9 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
CF
2005
ACM
13 years 9 months ago
A case for a working-set-based memory hierarchy
Modern microprocessor designs continue to obtain impressive performance gains through increasing clock rates and advances in the parallelism obtained via micro-architecture design...
Steve Carr, Soner Önder
UAI
2007
13 years 8 months ago
"I Can Name that Bayesian Network in Two Matrixes!"
The traditional approach to building Bayesian networks is to build the graphical structure using a graphical editor and then add probabilities using a separate spreadsheet for eac...
Russell Almond
BMCBI
2007
135views more  BMCBI 2007»
13 years 7 months ago
Automatic extraction of reliable regions from multiple sequence alignments
Background: High quality multiple alignments are crucial in the transfer of annotation from one genome to another. Multiple alignment methods strive to achieve ever increasing lev...
Timo Lassmann, Erik L. L. Sonnhammer
SIGSOFT
2010
ACM
13 years 6 months ago
SCORE: the first student contest on software engineering
The Student Contest on Software Engineering (SCORE), organized for the first time in conjunction with the International Conference on Software Engineering (ICSE) 2009, attracted 5...
Dino Mandrioli, Stephen Fickas, Carlo A. Furia, Me...