Sciweavers

1278 search results - page 249 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
DAIS
2009
13 years 8 months ago
Fault-Tolerant Aggregation by Flow Updating
Data aggregation plays an important role in the design of scalable systems, allowing the determination of meaningful system-wide properties to direct the execution of distributed a...
Paulo Jesus, Carlos Baquero, Paulo Sérgio A...
CGF
2010
155views more  CGF 2010»
13 years 7 months ago
SmallWorlds: Visualizing Social Recommendations
We present SmallWorlds, a visual interactive graph-based interface that allows users to specify, refine and build item-preference profiles in a variety of domains. The interface f...
Brynjar Gretarsson, John O'Donovan, Svetlin Bostan...
NDSS
2007
IEEE
14 years 2 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 5 months ago
An In-depth Analysis of Spam and Spammers
Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant in...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
JIIS
2006
113views more  JIIS 2006»
13 years 7 months ago
Spatial ordering and encoding for geographic data mining and visualization
: Geographic information (e.g., locations, networks, and nearest neighbors) are unique and different from other aspatial attributes (e.g., population, sales, or income). It is a ch...
Diansheng Guo, Mark Gahegan