Sciweavers

138 search results - page 21 / 28
» A Probabilistic Approach for Maintaining Trust Based on Evid...
Sort
View
ISSTA
2006
ACM
14 years 2 months ago
Producing scheduling that causes concurrent programs to fail
A noise maker is a tool that seeds a concurrent program with conditional synchronization primitives (such as yield()) for the purpose of increasing the likelihood that a bug manif...
Yosi Ben-Asher, Yaniv Eytani, Eitan Farchi, Shmuel...
SIGIR
2010
ACM
13 years 9 months ago
Generalized syntactic and semantic models of query reformulation
We present a novel approach to query reformulation which combines syntactic and semantic information by means of generalized Levenshtein distance algorithms where the substitution...
Amac Herdagdelen, Massimiliano Ciaramita, Daniel M...
IVC
2010
121views more  IVC 2010»
13 years 7 months ago
Multiview segmentation and tracking of dynamic occluding layers
We present an algorithm for the layered segmentation of video data in multiple views. The approach is based on computing the parameters of a layered representation of the scene in...
Ian D. Reid, Keith Connor
ACSAC
2008
IEEE
14 years 3 months ago
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks
Cross-site Scripting (XSS) has emerged to one of the most prevalent type of security vulnerabilities. While the reason for the vulnerability primarily lies on the serverside, the ...
Martin Johns, Björn Engelmann, Joachim Posegg...
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
14 years 3 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...