Sciweavers

241 search results - page 33 / 49
» Predicting vulnerable software components
Sort
View
WIDM
2005
ACM
14 years 1 months ago
Preventing shilling attacks in online recommender systems
Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalize...
Paul-Alexandru Chirita, Wolfgang Nejdl, Cristian Z...
GECCO
2007
Springer
269views Optimization» more  GECCO 2007»
14 years 1 months ago
Automated red teaming: a proposed framework for military application
In this paper, we describe Automated Red Teaming (ART), a concept that uses Evolutionary Algorithm (EA), Parallel Computing and Simulation to complement the manual Red Teaming eff...
Chwee Seng Choo, Ching Lian Chua, Su-Han Victor Ta...
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
13 years 11 months ago
Security when people matter: structuring incentives for user behavior
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives p...
Rick Wash, Jeffrey K. MacKie-Mason
WOSP
1998
ACM
13 years 12 months ago
Poems: end-to-end performance design of large parallel adaptive computational systems
The POEMS project is creating an environment for end-to-end performance modeling of complex parallel and distributed systems, spanning the domains of application software, runti...
Ewa Deelman, Aditya Dube, Adolfy Hoisie, Yong Luo,...
DATE
2007
IEEE
223views Hardware» more  DATE 2007»
14 years 2 months ago
CARAT: a toolkit for design and performance analysis of component-based embedded systems
Solid frameworks and toolkits for design and analysis of embedded systems are of high importance, since they enable early reasoning about critical properties of a system. This pap...
Egor R. V. Bondarev, Michel R. V. Chaudron, Peter ...