Sciweavers

1005 search results - page 199 / 201
» Information systems security engineering: a critical compone...
Sort
View
ICEB
2004
234views Business» more  ICEB 2004»
13 years 9 months ago
A Component-based Framework for Distributed Business Simulations in E-Business Environments
Simulations preserve the knowledge of complex dynamic systems and consequently transfer the knowledge of the cohesions of its elements to a specified target group. As the progress...
Alexander Hampel, Edward Bernroider
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
14 years 4 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
VRML
2003
ACM
14 years 23 days ago
Behavior3D: an XML-based framework for 3D graphics behavior
Success of 3D applications on the Web inherently depends on object behavior and interaction. Current Web3D formats often fall short in supporting behavior modeling. This paper int...
Raimund Dachselt, Enrico Rukzio
IJISEC
2007
119views more  IJISEC 2007»
13 years 7 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny