Sciweavers

5085 search results - page 916 / 1017
» Multidimensional Design by Examples
Sort
View
INFOCOM
2009
IEEE
15 years 9 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
128
Voted
ASIACRYPT
2009
Springer
15 years 9 months ago
Foundations of Non-malleable Hash and One-Way Functions
Non-malleability is an interesting and useful property which ensures that a cryptographic protocol preserves the independence of the underlying values: given for example an encryp...
Alexandra Boldyreva, David Cash, Marc Fischlin, Bo...
BPM
2009
Springer
169views Business» more  BPM 2009»
15 years 9 months ago
Analyzing Resource Behavior Using Process Mining
It is vital to use accurate models for the analysis, design, and/or control of business processes. Unfortunately, there are often important discrepancies between reality and models...
Joyce Nakatumba, Wil M. P. van der Aalst
WEBDB
2009
Springer
131views Database» more  WEBDB 2009»
15 years 9 months ago
Functional Dependency Generation and Applications in Pay-As-You-Go Data Integration Systems
Recently, the opportunity of extracting structured data from the Web has been identified by a number of research projects. One such example is that millions of relational-style H...
Daisy Zhe Wang, Xin Luna Dong, Anish Das Sarma, Mi...
ATAL
2009
Springer
15 years 9 months ago
Characterizing false-name-proof allocation rules in combinatorial auctions
A combinatorial auction mechanism consists of an allocation rule that defines the allocation of goods for each agent, and a payment rule that defines the payment of each winner....
Taiki Todo, Atsushi Iwasaki, Makoto Yokoo, Yuko Sa...