Computer Applications

Results: 4069



#Item
511

Secure Web Applications via Automatic Partitioning Stephen Chong Jed Liu Andrew C. Myers Xin Qi K. Vikram Lantian Zheng Xin Zheng Department of Computer Science Cornell University {schong,liujed,andru,qixin,kvikram,zlt,x

Add to Reading List

Source URL: tianyuan.org

Language: English - Date: 2008-05-10 23:29:40
    512

    Call for Papers The Third Workshop on Program Semantics, Specification and Verification: Theory and Applications (PSSVaffiliated with 7th International Computer Science Symposium in Russia (CSR-2012), will be held

    Add to Reading List

    Source URL: formal.iti.kit.edu

    Language: English - Date: 2014-02-04 15:10:28
      513Cryptography / Computer security / Language-based security / KeY / Ciphertext indistinguishability / Universal composability

      A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs Ralf Küsters∗ , Tomasz Truderung∗ , Bernhard Beckert† , Daniel Bruns† , Jürgen Graf† and Chris

      Add to Reading List

      Source URL: grsrd.uni.lu

      Language: English - Date: 2013-04-09 08:10:38
      514

      Game-theoretic probability and some of its applications Vladimir Vovk Department of Computer Science Royal Holloway, University of London Egham, Surrey

      Add to Reading List

      Source URL: www.vovk.net

      Language: English - Date: 2009-01-29 05:21:34
        515

        Single-Cluster Spectral Graph Partitioning for Robotics Applications Edwin Olson, Matthew Walter, Seth Teller, and John Leonard Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technolog

        Add to Reading List

        Source URL: www.roboticsproceedings.org

        Language: English - Date: 2015-06-22 09:52:54
          516

          International Journal of Computer Science and Applications, Vol. 5, No. 2, pp Technomathematics Research Foundation TRAFFIC ANALYSIS BAS ED IDENTIFICATION OF ATTACKS

          Add to Reading List

          Source URL: cecs.louisville.edu

          Language: English - Date: 2015-09-21 11:15:16
            517Computing / Cyberwarfare / Computer security / HTML / Cross-site scripting / Hacking / Web applications / Data management / Cross-site request forgery / JavaScript / Web application firewall / SQL injection

            PDF Document

            Add to Reading List

            Source URL: www.elearnsecurity.com

            Language: English - Date: 2014-11-24 05:50:21
            518

            Circuit Cellar, the Magazine for Computer Applications. Reprinted by permission. For subscription information, call, or www.circuitcellar.com. Entire contents copyright ©2008 Circuit Cellar Inc. All right

            Add to Reading List

            Source URL: www.neuro.sfc.keio.ac.jp

            Language: English - Date: 2008-04-01 20:57:23
              519

              Bitwise Logical Operations in CA-Visual Objects Patrick Lazzarotto Introduction Systems programming applications require low-level control over and access into the computer’s memory.

              Add to Reading List

              Source URL: www.cavo.com

              Language: English
                520

                Slub | 20010203_(folded)/20010307_(folded) MP3 + PDF | FSlub: process-based sonic improvisations; live generative music using hand-crafted Macintosh and Unix applications (in networked synchrony). Computer lan

                Add to Reading List

                Source URL: www.fallt.com

                - Date: 2007-01-04 19:08:16
                  UPDATE