Sciweavers

1316 search results - page 33 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
EXPCS
2007
14 years 1 months ago
An active approach to measuring routing dynamics induced by autonomous systems
We present an active measurement study of the routing dynamics induced by AS-path prepending, a common method for controlling the inbound traffic of a multi-homed ISP. Unlike oth...
Samantha Lo, Rocky K. C. Chang, Lorenzo Colitti
ICRA
2008
IEEE
123views Robotics» more  ICRA 2008»
14 years 3 months ago
Target-directed attention: Sequential decision-making for gaze planning
— It is widely agreed that efficient visual search requires the integration of target-driven top-down information and image-driven bottom-up information. Yet the problem of gaze...
Julia Vogel, Nando de Freitas
AIRWEB
2005
Springer
14 years 2 months ago
Blocking Blog Spam with Language Model Disagreement
We present an approach for detecting link spam common in blog comments by comparing the language models used in the blog post, the comment, and pages linked by the comments. In co...
Gilad Mishne, David Carmel, Ronny Lempel
SAC
2008
ACM
13 years 8 months ago
Web service security management using semantic web techniques
The importance of the Web service technology for business, government, among other sectors, is growing. Its use in these sectors demands security concern. The Web Services Securit...
Diego Zuquim Guimarães Garcia, Maria Beatri...
CSFW
2008
IEEE
14 years 3 months ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...