Sciweavers

554 search results - page 79 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
SOFTVIS
2005
ACM
14 years 2 months ago
Towards understanding programs through wear-based filtering
Large software projects often require a programmer to make changes to unfamiliar source code. This paper presents the results of a formative observational study of seven professio...
Robert DeLine, Amir Khella, Mary Czerwinski, Georg...
CCS
2011
ACM
12 years 8 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
SIGMOD
2006
ACM
156views Database» more  SIGMOD 2006»
14 years 8 months ago
MauveDB: supporting model-based user views in database systems
Real-world data -- especially when generated by distributed measurement infrastructures such as sensor networks -- tends to be incomplete, imprecise, and erroneous, making it impo...
Amol Deshpande, Samuel Madden
BMCBI
2010
137views more  BMCBI 2010»
13 years 8 months ago
Biana: a software framework for compiling biological interactions and analyzing networks
Background: The analysis and usage of biological data is hindered by the spread of information across multiple repositories and the difficulties posed by different nomenclature sy...
Javier Garcia-Garcia, Emre Guney, Ramon Aragues, J...
SDM
2009
SIAM
215views Data Mining» more  SDM 2009»
14 years 6 months ago
Hybrid Clustering of Text Mining and Bibliometrics Applied to Journal Sets.
To obtain correlated and complementary information contained in text mining and bibliometrics, hybrid clustering to incorporate textual content and citation information has become...
Bart De Moor, Frizo A. L. Janssens, Shi Yu, Wolfga...