Sciweavers

1415 search results - page 232 / 283
» Verified systems by composition from verified components
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks
Cross-site Scripting (XSS) has emerged to one of the most prevalent type of security vulnerabilities. While the reason for the vulnerability primarily lies on the serverside, the ...
Martin Johns, Björn Engelmann, Joachim Posegg...
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
14 years 2 months ago
Can a P2P File-Sharing Network Become an e-Marketplace?
The prevalence of P2P technology contributes the ease of file-sharing, but it also brings some problems such as free-riding and copyright infringement. To solve these problems, ma...
Fu-ren Lin, Hau-ming Lo, Cong-ren Wang
ICC
2008
IEEE
143views Communications» more  ICC 2008»
14 years 2 months ago
A Closed-Form Expression for Static Worm-Scanning Strategies
—This work presents a closed-form expression for characterizing the spread of static worm-scanning strategies through a mean-field approximation. Our model can both accurately c...
Zesheng Chen, Chao Chen
ICEBE
2007
IEEE
79views Business» more  ICEBE 2007»
14 years 2 months ago
Partition-based Profit Optimisation for Multi-class Requests in Clusters of Servers
This paper investigates profit optimisation by the partitioning of server pools. Different types of web requests are considered in this paper: best-effort requests and multi-class...
Ligang He, James Wen Jun Xue, Stephen A. Jarvis
CC
2007
Springer
109views System Software» more  CC 2007»
14 years 1 months ago
Layout Transformations for Heap Objects Using Static Access Patterns
As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
Jinseong Jeon, Keoncheol Shin, Hwansoo Han