Sciweavers

3451 search results - page 548 / 691
» Collaborative attack modeling
Sort
View
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
14 years 10 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
ICSE
2008
IEEE-ACM
14 years 10 months ago
Clonetracker: tool support for code clone management
Code clones are generally considered to be an obstacle to software maintenance. Research has provided evidence that it may not always be practical, feasible, or cost-effective to ...
Ekwa Duala-Ekoko, Martin P. Robillard
WWW
2008
ACM
14 years 10 months ago
First workshop on targeting and ranking for online advertising
Online advertising is a rapidly growing, multi-billion dollar industry. It has become a significant element of the Web browsing experience. Ad platforms used for ad selection use ...
Ewa Dominowska, Vanja Josifovski
CHI
2006
ACM
14 years 9 months ago
Player-centred game design
We describe an approach to player-centred game design through adaptive game technologies [9]. The work presented is the result of on-going collaborative research between Media and...
Jonathan Sykes, Melissa Federoff
ICSE
2004
IEEE-ACM
14 years 9 months ago
Toward Undoing in Composite Web Services
Cancelling or reversing the effect of a former action is a necessity in most interactive systems. The simplest and most frequent form of this facility is the "undo" comma...
Marie-Claude Gaudel