Sciweavers

2036 search results - page 7 / 408
» Using and Abusing XML
Sort
View
EDM
2008
110views Data Mining» more  EDM 2008»
13 years 10 months ago
A Response Time Model For Bottom-Out Hints as Worked Examples
Students can use an educational system's help in unexpected r example, they may bypass abstract hints in search of a concrete solution. This behavior has traditionally been la...
Benjamin Shih, Kenneth R. Koedinger, Richard Schei...
CEAS
2008
Springer
13 years 11 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
TDSC
2011
13 years 3 months ago
Nymble: Blocking Misbehaving Users in Anonymizing Networks
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sea...
ESORICS
2007
Springer
14 years 26 days ago
Pragmatic XML Access Control Using Off-the-Shelf RDBMS
As the XML model gets more popular, new needs arise to specify access control within XML model. Various XML access control models and enforcement methods have been proposed recentl...
Bo Luo, Dongwon Lee, Peng Liu
CRIWG
2009
13 years 10 months ago
MobMaps: Towards a Shared Environment for Collaborative Social Activism
Nowadays it is possible to disseminate information to the all world in real time using current communication tools supported mostly by the Internet. The work of several organizatio...
Luís Gens, Hugo Paredes, Paulo Martins, Ben...