Sciweavers

1028 search results - page 176 / 206
» Using Attack Graphs to Design Systems
Sort
View
WWW
2010
ACM
14 years 2 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
KDD
2009
ACM
152views Data Mining» more  KDD 2009»
14 years 9 months ago
TANGENT: a novel, 'Surprise me', recommendation algorithm
Most of recommender systems try to find items that are most relevant to the older choices of a given user. Here we focus on the "surprise me" query: A user may be bored ...
Kensuke Onuma, Hanghang Tong, Christos Faloutsos
MOBICOM
2006
ACM
14 years 2 months ago
Boundary recognition in sensor networks by topological methods
Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to bot...
Yue Wang, Jie Gao, Joseph S. B. Mitchell
PLDI
2004
ACM
14 years 2 months ago
Parametric regular path queries
Regular path queries are a way of declaratively expressing queries on graphs as regular-expression-like patterns that are matched against paths in the graph. There are two kinds o...
Yanhong A. Liu, Tom Rothamel, Fuxiang Yu, Scott D....
AOSE
2005
Springer
14 years 2 months ago
Improving AOSE with an Enriched Modelling Framework
Many approaches and tools assist the various tasks required to develop a multi-agent system (MAS), yet there still remains a gap between the generation of MAS models and program co...
Richard Hill, Simon Polovina, Martin D. Beer