Sciweavers

1368 search results - page 242 / 274
» Data Engineering for the Analysis of Semiconductor Manufactu...
Sort
View
ESORICS
2004
Springer
14 years 2 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CHI
2007
ACM
14 years 9 months ago
Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognition
Sensors are becoming increasingly important in interaction design. Authoring a sensor-based interaction comprises three steps: choosing and connecting the appropriate hardware, cr...
Björn Hartmann, Leith Abdulla, Manas Mittal, ...
CHI
2010
ACM
14 years 3 months ago
Gender demographic targeting in sponsored search
In this research, we evaluate the effect of gender in analyzing the performance of sponsored search advertising. We examine a log file with data comprised of nearly 7,000,000 reco...
Bernard J. Jansen, Lauren Solomon
EDBT
2009
ACM
123views Database» more  EDBT 2009»
14 years 3 months ago
High-performance information extraction with AliBaba
A wealth of information is available only in web pages, patents, publications etc. Extracting information from such sources is challenging, both due to the typically complex langu...
Peter Palaga, Long Nguyen, Ulf Leser, Jörg Ha...