Sciweavers

420 search results - page 59 / 84
» Using static analysis for Ajax intrusion detection
Sort
View
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
PERCOM
2007
ACM
14 years 7 months ago
Buddy tracking - efficient proximity detection among mobile friends
: Global positioning systems (GPS) and mobile phone networks are making it possible to track individual users with an increasing accuracy. It is natural to ask whether one can use ...
Arnon Amir, Alon Efrat, Jussi Myllymaki, Lingeshwa...
SIGSOFT
2010
ACM
13 years 5 months ago
Phantm: PHP analyzer for type mismatch
We present Phantm, a static analyzer that uses a flowsensitive analysis to detect type errors in PHP applications. Phantm can infer types for nested arrays, and can leverage runti...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
CAIP
2005
Springer
13 years 9 months ago
Improvement of a Temporal Video Index Produced by an Object Detector
The goal of the works described in this paper is to improve results produced by an object detector operating independently on each frame of a video document in order to generate a ...
Gaël Jaffré, Philippe Joly
CJ
2010
150views more  CJ 2010»
13 years 4 months ago
Program Analysis Probably Counts
Abstract. Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology inc...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...