Sciweavers

796 search results - page 88 / 160
» Spoofing prevention method
Sort
View
ICDE
1991
IEEE
103views Database» more  ICDE 1991»
14 years 1 months ago
On Serializability of Multidatabase Transactions Through Forced Local Conflicts
The maindi culty in enforcing globalserializabilityin a multidatabase environment lies in resolving indirect (transitive) con icts between multidatabase transactions. Indirect con...
Dimitrios Georgakopoulos, Marek Rusinkiewicz, Amit...
GECCO
2010
Springer
220views Optimization» more  GECCO 2010»
14 years 1 months ago
Interday foreign exchange trading using linear genetic programming
Foreign exchange (forex) market trading using evolutionary algorithms is an active and controversial area of research. We investigate the use of a linear genetic programming (LGP)...
Garnett Carl Wilson, Wolfgang Banzhaf
USS
2008
14 years 9 days ago
Securing Frame Communication in Browsers
Many web sites embed third-party content in frames, relying on the browser's security policy to protect them from malicious content. Frames, however, are often insufficient i...
Adam Barth, Collin Jackson, John C. Mitchell
ICMLA
2007
13 years 11 months ago
Scalable optimal linear representation for face and object recognition
Optimal Component Analysis (OCA) is a linear method for feature extraction and dimension reduction. It has been widely used in many applications such as face and object recognitio...
Yiming Wu, Xiuwen Liu, Washington Mio
ECIS
2003
13 years 11 months ago
Assessing the business consequences of systems risk
Both public media and IS research have produced a detailed view of different risks associated with computers. Measures to prevent systems risks from occurring are also well docume...
Hannu Salmela