Sciweavers

100 search results - page 9 / 20
» Valuing IT through Virtual Process Measurement
Sort
View
SAC
2011
ACM
12 years 10 months ago
Reliable protection against session fixation attacks
The term ‘Session Fixation vulnerability’ subsumes issues in Web applications that under certain circumstances enable the adversary to perform a Session Hijacking attack throu...
Martin Johns, Bastian Braun, Michael Schrank, Joac...
IADIS
2003
13 years 8 months ago
Application of Metadata and Replication Mechanisms in Industrial Databases
Power transformers' failures carry great costs to electric companies since they need resources to recover from them and to perform periodical maintenance. To avoid this probl...
Perfecto Mariño, César A. Sigüe...
PRESENCE
1998
101views more  PRESENCE 1998»
13 years 7 months ago
Locomotion Mode Affects the Updating of Objects Encountered During Travel: The Contribution of Vestibular and Proprioceptive Inp
In two experiments, subjects traveled through virtual mazes, encountering target objects along the way. Their task was to indicate the direction to these target objects from a ter...
Sarah S. Chance, Florence Gaunet, Andrew C. Beall,...
ECAL
2007
Springer
14 years 1 months ago
Evolving Cultural Learning Parameters in an NK Fitness Landscape
Cultural learning allows individuals to acquire knowledge from others through non-genetic means. The effect of cultural learning on the evolution of artificial organisms has been...
Dara Curran, Colm O'Riordan, Humphrey Sorensen
DMKD
2003
ACM
148views Data Mining» more  DMKD 2003»
14 years 21 days ago
A symbolic representation of time series, with implications for streaming algorithms
The parallel explosions of interest in streaming data, and data mining of time series have had surprisingly little intersection. This is in spite of the fact that time series data...
Jessica Lin, Eamonn J. Keogh, Stefano Lonardi, Bil...