Sciweavers

236 search results - page 39 / 48
» Reasoning with Prioritized Defaults
Sort
View
ACMDIS
2004
ACM
14 years 28 days ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
GIS
2009
ACM
14 years 3 days ago
In-network query processing in mobile P2P databases
The in-network query processing paradigm in sensor networks postulates that a query is routed among sensors and collects the answers from the sensors on its trajectory. It works f...
Bo Xu, Fatemeh Vafaee, Ouri Wolfson
CN
2007
141views more  CN 2007»
13 years 7 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
RAID
2010
Springer
13 years 5 months ago
On Challenges in Evaluating Malware Clustering
Malware clustering and classification are important tools that enable analysts to prioritize their malware analysis efforts. The recent emergence of fully automated methods for ma...
Peng Li, Limin Liu, Debin Gao, Michael K. Reiter
ACSAC
2010
IEEE
13 years 5 months ago
Spam mitigation using spatio-temporal reputations from blacklist history
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally maintained and well regarded, blacklists can filter 80+% of spam without having to...
Andrew G. West, Adam J. Aviv, Jian Chang, Insup Le...