Computer Applications

Results: 4069



#Item
451

Path Selection: A Novel Interaction Technique for Mapping Applications Michael Ludwig, Reid Priedhorsky, Loren Terveen GroupLens Research, Department of Computer Science and Engineering University of Minnesota, Minneapol

Add to Reading List

Source URL: reidster.net

Language: English - Date: 2011-02-13 18:16:05
    452Computing / Computer security / Cyberwarfare / Hacking / Software testing / Vulnerability / SQL injection / Transport Layer Security / Dynamic SSL

    http://www.sektioneins.de Security Problems in Web Applications except Injection Vulnerabilities Stefan Esser <> Ben Fuhrmannek <>

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2011-02-06 15:51:10
    453Computing / Cyberwarfare / Software engineering / Hacking / Software testing / SQL / Computer security / Data management / SQL injection / Vulnerability / Data-flow analysis / Denial-of-service attack

    Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2015-05-20 23:58:55
    454Computing / Network architecture / Network protocols / Computer networking / Network performance / Networking hardware / Bandwidth / Network switch / Throughput / Router / Virtual private network / Synchronous optical networking

    1 UltraScience Net: Network Testbed for Large-Scale Science Applications Nageswara S. V. Rao

    Add to Reading List

    Source URL: www.csm.ornl.gov

    Language: English - Date: 2005-03-10 15:30:57
    455

    Microstrip Antenna Designs for Sensor and Communications Applications David Pozar Electrical and Computer Engineering University of Massachusetts at Amherst Amherst MA 01003

    Add to Reading List

    Source URL: www.ecs.umass.edu

    Language: English - Date: 2011-06-17 13:49:59
      456

      ODK Tables: Building Easily Customizable Information Applications on Android Devices Waylon Brunette, Samuel Sudar, Nicholas Worden, Dylan Price, Richard Anderson, Gaetano Borriello Department of Computer Science and Eng

      Add to Reading List

      Source URL: opendatakit.org

      Language: English - Date: 2013-02-14 09:58:20
        457

        International Journal of Computer Applications (0975 – 8887) Volume 27– No.1, August 2011 A Novel Real Time Algorithm for Remote Sensing Lossless Data Compression based on Enhanced DPCM P. Ghamisi

        Add to Reading List

        Source URL: www.ijcaonline.org

        Language: English - Date: 2011-08-30 06:40:39
          458

          On Combining Theories with Shared Set Operations Thomas Wies, Ruzica Piskac, and Viktor Kuncak EPFL School of Computer and Communication Sciences, Switzerland Abstract. Motivated by applications in software verification

          Add to Reading List

          Source URL: www.mpi-sws.org

          Language: English - Date: 2009-06-23 06:47:19
            459

            An Architecture For Enforcing JavaScript Randomization in Web2.0 Applications (Short Paper) Elias Athanasopoulos, Antonis Krithinakis, and Evangelos P. Markatos Institute of Computer Science, Foundation for Research and

            Add to Reading List

            Source URL: users.ics.forth.gr

            Language: English - Date: 2010-11-23 05:43:52
              460

              Measure on Small Complexity Classes, with Applications for BPP Eric Allender Department of Computer Science Rutgers University New Brunswick, NJ 08903

              Add to Reading List

              Source URL: ftp.cs.rutgers.edu

              Language: English - Date: 2001-06-15 14:23:16
                UPDATE