Much effort is spent everyday by programmers in trying to reduce long, failing execution traces to the cause of the error. We present a new algorithm for error cause localization ...
Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant in...
This paper addresses the collaborative development of information infrastructure for supporting data-rich scientific collaboration. Studying infrastructure development empirically ...
Helena Karasti, Karen S. Baker, Florence Millerand
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...