Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Comerica, Subash
Ruckus Networks(An ARRIS Company)
Sunnyvale, California
 
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 5 of 5 reviews

   
  Rethinking regex engines to address ReDoS
Davis J.  ESEC/FSE 2019 (Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Tallinn, Estonia, Aug 26-30, 2019) 1256-1258, 2019.  Type: Proceedings

Regular expressions (regexes) are widely used across computer science applications and software components. However, not all programming languages are immune to regular expression denial-of-service (ReDoS) attacks. These algorithmic co...

Dec 31 2020  
  Adaptive network tools and services network topology mapper
Monserate G., Mendez J.  ICIT 2018 (Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, Hong Kong, Dec 29-31, 2018) 115-119, 2018.  Type: Proceedings

Modern educational institutions provide Internet access in order to empower students with web-based resources. These institutions typically use network tools for terminal monitoring, power management, and access control....

Jul 30 2019  
  Scalable and efficient data analytics and mining with Lemonade
dos Santos W., Avelar G., Ribeiro M., Guedes D., Meira Jr. W. Proceedings of the VLDB Endowment 11(12): 2070-2073, 2018.  Type: Article

It is unreasonable to assume that data analysis experts are adept at computer programming. However, many tools that a data analyst may want to use require significant programming skills. Moreover, with the amount of information availab...

May 21 2019  
   A novel multilayer AAA model for integrated applications
Rezakhani A., Shirazi H., Modiri N. Neural Computing and Applications 29(10): 887-901, 2018.  Type: Article

Unidimensional static security policies cannot cater to the needs of a growing enterprise anymore. Local regulations, business processes, operational levels, and threat modeling are the key anchors around which successful organizations...

Mar 22 2019  
  A long way to the top: significance, structure, and stability of Internet top lists
Scheitle Q., Hohlfeld O., Gamba J., Jelten J., Zimmermann T., Strowes S., Vallina-Rodriguez N.  IMC 2018 (Proceedings of the 2018 Internet Measurement Conference, Boston, MA, Oct 31-Nov 2, 2018) 478-493, 2018.  Type: Proceedings

Research communities that analyze parameters like Internet measurement, privacy, and network security typically use Internet top lists. As the selected Internet top list affects the research, it is very important to know how these list...

Feb 5 2019  
 
 
   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy