Sciweavers

11030 search results - page 2030 / 2206
» Generative Sound Models
Sort
View
SIGSOFT
2005
ACM
14 years 10 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
WWW
2007
ACM
14 years 10 months ago
Open user profiles for adaptive news systems: help or harm?
Over the last five years, a range of projects have focused on progressively more elaborated techniques for adaptive news delivery. However, the adaptation process in these systems...
Jae-wook Ahn, Peter Brusilovsky, Jonathan Grady, D...
WWW
2007
ACM
14 years 10 months ago
Detectives: detecting coalition hit inflation attacks in advertising networks streams
Click fraud is jeopardizing the industry of Internet advertising. Internet advertising is crucial for the thriving of the entire Internet, since it allows producers to advertise t...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
WWW
2005
ACM
14 years 10 months ago
Using XForms to simplify Web programming
The difficulty of developing and deploying commercial web applications increases as the number of technologies they use increases and as the interactions between these technologie...
Richard Cardone, Danny Soroker, Alpana Tiwari
KDD
2004
ACM
131views Data Mining» more  KDD 2004»
14 years 10 months ago
Fast nonlinear regression via eigenimages applied to galactic morphology
Astronomy increasingly faces the issue of massive datasets. For instance, the Sloan Digital Sky Survey (SDSS) has so far generated tens of millions of images of distant galaxies, ...
Brigham Anderson, Andrew W. Moore, Andrew Connolly...
« Prev « First page 2030 / 2206 Last » Next »