Sciweavers

861 search results - page 142 / 173
» Predicting change impact from logical models
Sort
View
WOSP
2010
ACM
13 years 11 months ago
A framework for utility-based service oriented design in SASSY
The architecture of a software system has a significant impact on its quality of service (QoS) as measured by several performance metrics such as execution time, availability, th...
Daniel A. Menascé, John M. Ewing, Hassan Go...
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
13 years 5 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...

Publication
145views
13 years 3 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
MOBICOM
2006
ACM
14 years 1 months ago
Multipath profile discrimination in TOA-based WLAN ranging with link layer frames
Indoor ranging and location in WLAN is possible through obtaining Round-Trip-Time (RTT) measurements at data link level. This procedure allows using the existing IEEE 802.11 WLAN ...
Marc Ciurana, Francisco Barceló, Sebastiano...
DMIN
2007
183views Data Mining» more  DMIN 2007»
13 years 8 months ago
Crawling Attacks Against Web-based Recommender Systems
—User profiles derived from Web navigation data are used in important e-commerce applications such as Web personalization, recommender systems, and Web analytics. In the open en...
Runa Bhaumik, Robin D. Burke, Bamshad Mobasher