Sciweavers

3451 search results - page 548 / 691
» Collaborative attack modeling
Sort
View
218
Voted
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
16 years 3 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
131
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Clonetracker: tool support for code clone management
Code clones are generally considered to be an obstacle to software maintenance. Research has provided evidence that it may not always be practical, feasible, or cost-effective to ...
Ekwa Duala-Ekoko, Martin P. Robillard
143
Voted
WWW
2008
ACM
16 years 2 months ago
First workshop on targeting and ranking for online advertising
Online advertising is a rapidly growing, multi-billion dollar industry. It has become a significant element of the Web browsing experience. Ad platforms used for ad selection use ...
Ewa Dominowska, Vanja Josifovski
99
Voted
CHI
2006
ACM
16 years 2 months ago
Player-centred game design
We describe an approach to player-centred game design through adaptive game technologies [9]. The work presented is the result of on-going collaborative research between Media and...
Jonathan Sykes, Melissa Federoff
105
Voted
ICSE
2004
IEEE-ACM
16 years 2 months ago
Toward Undoing in Composite Web Services
Cancelling or reversing the effect of a former action is a necessity in most interactive systems. The simplest and most frequent form of this facility is the "undo" comma...
Marie-Claude Gaudel