Sciweavers

579 search results - page 53 / 116
» Intersecting Classes and Prototypes
Sort
View
RAID
2010
Springer
13 years 6 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
ICDT
2009
ACM
121views Database» more  ICDT 2009»
13 years 5 months ago
Automatic verification of database-driven systems: a new frontier
We describe a novel approach to verification of software systems centered around an underlying database. Instead of applying general-purpose techniques with only partial guarantee...
Victor Vianu
GPCE
2005
Springer
14 years 1 months ago
Mapping Features to Models: A Template Approach Based on Superimposed Variants
Although a feature model can represent commonalities and variabilities in a very concise taxonomic form, features in a feature model are merely symbols. Mapping features to other m...
Krzysztof Czarnecki, Michal Antkiewicz
IDS
1994
139views Database» more  IDS 1994»
13 years 12 months ago
Three Dimensional Interface for an Object Oriented Database
An experimental 3D interface to an object oriented database is described. It is hoped that using such techniques will help make complex data structures more comprehensible and eas...
Martin H. Rapley, Jessie B. Kennedy
FC
2009
Springer
67views Cryptology» more  FC 2009»
13 years 11 months ago
Privacy-Preserving Classifier Learning
We present an efficient protocol for the privacy-preserving, distributed learning of decision-tree classifiers. Our protocol allows a user to construct a classifier on a database h...
Justin Brickell, Vitaly Shmatikov