Sciweavers

1176 search results - page 208 / 236
» Exploiting Online Games
Sort
View
ESORICS
2008
Springer
13 years 10 months ago
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
Abstract. Identity fraud (IDF) may be defined as unauthorized exploitation of credential information through the use of false identity. We propose CROO, a universal (i.e. generic) ...
D. Nali, Paul C. van Oorschot
BMCBI
2010
163views more  BMCBI 2010»
13 years 8 months ago
Integration of open access literature into the RCSB Protein Data Bank using BioLit
Background: Biological data have traditionally been stored and made publicly available through a variety of on-line databases, whereas biological knowledge has traditionally been ...
Andreas Prlic, Marco A. Martinez, Dimitris Dimitro...
EC
2006
195views ECommerce» more  EC 2006»
13 years 8 months ago
Automated Global Structure Extraction for Effective Local Building Block Processing in XCS
Learning Classifier Systems (LCSs), such as the accuracy-based XCS, evolve distributed problem solutions represented by a population of rules. During evolution, features are speci...
Martin V. Butz, Martin Pelikan, Xavier Llorà...
EMSOFT
2010
Springer
13 years 6 months ago
Power-aware temporal isolation with variable-bandwidth servers
Variable-bandwidth servers (VBS) control process execution speed by allocating variable CPU bandwidth to processes. VBS enables temporal isolation of EDF-scheduled processes in th...
Silviu S. Craciunas, Christoph M. Kirsch, Ana Soko...
CORR
2011
Springer
217views Education» more  CORR 2011»
13 years 12 days ago
Coarse-Grained Topology Estimation via Graph Sampling
Many online networks are measured and studied via sampling techniques, which typically collect a relatively small fraction of nodes and their associated edges. Past work in this a...
Maciej Kurant, Minas Gjoka, Yan Wang, Zack W. Almq...