Sciweavers

127 search results - page 21 / 26
» Quantifying information leaks in software
Sort
View
CCR
2011
13 years 2 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
CIKM
2011
Springer
12 years 7 months ago
On the elasticity of NoSQL databases over cloud management platforms
NoSQL databases focus on analytical processing of large scale datasets, offering increased scalability over commodity hardware. One of their strongest features is elasticity, whi...
Ioannis Konstantinou, Evangelos Angelou, Christina...
FOIKS
2006
Springer
13 years 11 months ago
Consistency Checking Algorithms for Restricted UML Class Diagrams
Abstract. Automatic debugging of UML class diagrams helps in the visual specification of software systems because users cannot detect errors in logical inconsistency easily. This p...
Ken Kaneiwa, Ken Satoh
WWW
2003
ACM
14 years 8 months ago
Techniques and Metrics for Improving Website Structure
In this work two distinct metrics are proposed, which aim to quantify the importance of a web page based on the visits it receives by the users and its location within the website...
Eleni Christopoulou, John D. Garofalakis, Christos...
CANDT
2009
13 years 11 months ago
An analysis of the social structure of remix culture
We present findings from our study of a music sharing and remixing community in an effort to quantify and understand the structural characteristics of commons-based peer productio...
Giorgos Cheliotis, Jude Yew