Sciweavers

123 search results - page 20 / 25
» Patterns for Automated Management of Security and Dependabil...
Sort
View
WWW
2007
ACM
14 years 7 months ago
Detectives: detecting coalition hit inflation attacks in advertising networks streams
Click fraud is jeopardizing the industry of Internet advertising. Internet advertising is crucial for the thriving of the entire Internet, since it allows producers to advertise t...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
11 years 9 months ago
Differentially private transit data publication: a case study on the montreal transportation system
With the wide deployment of smart card automated fare collection (SCAFC) systems, public transit agencies have been benefiting from huge volume of transit data, a kind of sequent...
Rui Chen, Benjamin C. M. Fung, Bipin C. Desai, N&e...
VEE
2012
ACM
222views Virtualization» more  VEE 2012»
12 years 2 months ago
Unpicking the knot: teasing apart VM/application interdependencies
Flexible and efficient runtime design requires an understanding of the dependencies among the components internal to the runtime and those between the application and the runtime...
Yi Lin, Stephen M. Blackburn, Daniel Frampton
CAISE
1997
Springer
13 years 11 months ago
OO-METHOD: An OO Software Production Environment Combining Conventional and Formal Methods
OO-Method is an OO Methodology that blends the use of formal specification systems with conventional OO methodologies based on practice. In contrast to other approaches in this fi...
Oscar Pastor, Emilio Insfrán, Vicente Pelec...
TMI
2010
134views more  TMI 2010»
13 years 1 months ago
Detection and Segmentation of Colonic Polyps on Implicit Isosurfaces by Second Principal Curvature Flow
Abstract--Today's computer aided detection systems for computed tomography colonography (CTC) enable automated detection and segmentation of colorectal polyps. We present a pa...
Cees van Wijk, Vincent Frans van Ravesteijn, Frans...