Sciweavers

24 search results - page 4 / 5
» Empirical Analysis of Attackers Activity on Multi-tier Web S...
Sort
View
ICWS
2010
IEEE
13 years 9 months ago
Analyzing the Relationships between some Parameters of Web Services Reputation
In this paper, we provide an analysis of the impacts of some reputation parameters that an agent-based Web service holds while being active in the environment. To this end, we depl...
Babak Khosravifar, Jamal Bentahar, Ahmad Moazin
SE
2007
13 years 9 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller
CCS
2004
ACM
14 years 26 days ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
ACMDIS
2006
ACM
13 years 11 months ago
Randomness as a resource for design
Randomness is being harnessed in the design of some interactive systems. This is observed in random blogs, random web searching, and in particular Apple's iPod Shuffle. Yet t...
Tuck Wah Leong, Frank Vetere, Steve Howard
BMCBI
2004
126views more  BMCBI 2004»
13 years 7 months ago
Visualization and analysis of microarray and gene ontology data with treemaps
Background: The increasing complexity of genomic data presents several challenges for biologists. Limited computer monitor views of data complexity and the dynamic nature of data ...
Eric H. Baehrecke, Niem Dang, Ketan Babaria, Ben S...