Sciweavers

950 search results - page 28 / 190
» presence 2008
Sort
View
IEEEARES
2008
IEEE
14 years 4 months ago
How to Open a File and Not Get Hacked
Careless attention to opening files, often caused by problems with path traversal or shared directories, can expose applications to attacks on the file names that they use. In t...
James A. Kupsch, Barton P. Miller
IWPC
2008
IEEE
14 years 4 months ago
The Reuse of Grammars with Embedded Semantic Actions
Reusing syntax specifications without embedded arbitrary semantic actions is straightforward because the semantic analysis phases of new applications can feed off trees or other ...
Terence Parr
NCA
2008
IEEE
14 years 4 months ago
A Fast and Robust Content-based Publish/Subscribe Architecture
We present cluster-based publish/subscribe, a novel architecture that is not only resilient to event broker failures but also provides load balancing and fast event dissemination ...
Hojjat Jafarpour, Sharad Mehrotra, Nalini Venkatas...
P2P
2008
IEEE
120views Communications» more  P2P 2008»
14 years 4 months ago
Failure-Tolerant Overlay Trees for Large-Scale Dynamic Networks
Trees are fundamental structures for data dissemination in large-scale network scenarios. However, their inherent fragility has led researchers to rely on more redundant mesh topo...
Davide Frey, Amy L. Murphy
SCAM
2008
IEEE
14 years 4 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...