Sciweavers

188 search results - page 22 / 38
» Finding Best k Policies
Sort
View
CCS
2010
ACM
13 years 10 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
IJET
2007
82views more  IJET 2007»
13 years 9 months ago
E-learning and the Educational Organizations Structure Reengineering (EOSR)
—There are many calls for innovative learning methods that utilize advanced technologies. However, we will raise fundamental questions that look deep into the future of the educa...
Osama K. Alshara, Mohamad Khalid AlSharo
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
14 years 3 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
VLDB
1998
ACM
192views Database» more  VLDB 1998»
14 years 2 months ago
Algorithms for Mining Distance-Based Outliers in Large Datasets
This paper deals with finding outliers (exceptions) in large, multidimensional datasets. The identification of outliers can lead to the discovery of truly unexpected knowledge in ...
Edwin M. Knorr, Raymond T. Ng
ESA
2008
Springer
142views Algorithms» more  ESA 2008»
13 years 11 months ago
Edge Coloring and Decompositions of Weighted Graphs
We consider two generalizations of the edge coloring problem in bipartite graphs. The first problem we consider is the weighted bipartite edge coloring problem where we are given a...
Uriel Feige, Mohit Singh