Sciweavers

1795 search results - page 96 / 359
» Security Models and Information Flow
Sort
View
144
Voted
SAC
2002
ACM
15 years 3 months ago
Collaborative attack modeling
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Jan Steffan, Markus Schumacher
149
Voted
APAQS
2000
IEEE
15 years 8 months ago
Object-Based Data Flow Testing of Web Applications
Recently, the extraordinarygrowth in the World Wide Web has been sweeping through business and industry. Many companies have developed or integrated their mission-critical applica...
Chien-Hung Liu, David Chenho Kung, Pei Hsia, Chih-...
163
Voted
ICDM
2010
IEEE
212views Data Mining» more  ICDM 2010»
15 years 1 months ago
Modeling Information Diffusion in Implicit Networks
Social media forms a central domain for the production and dissemination of real-time information. Even though such flows of information have traditionally been thought of as diffu...
Jaewon Yang, Jure Leskovec
153
Voted
CORR
2006
Springer
145views Education» more  CORR 2006»
15 years 3 months ago
Product Multicommodity Flow in Wireless Networks
We provide a tight approximate characterization of the n-dimensional product multicommodity flow (PMF) region for a wireless network of n nodes. Separate characterizations in term...
Ritesh Madan, Devavrat Shah, Olivier Lév&ec...
146
Voted
CJ
2010
150views more  CJ 2010»
15 years 1 months ago
Program Analysis Probably Counts
Abstract. Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology inc...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...