Sciweavers

1369 search results - page 257 / 274
» A Practical Implementation of the Timing Attack
Sort
View
DEXA
2009
Springer
175views Database» more  DEXA 2009»
15 years 5 months ago
RoK: Roll-Up with the K-Means Clustering Method for Recommending OLAP Queries
Dimension hierarchies represent a substantial part of the data warehouse model. Indeed they allow decision makers to examine data at different levels of detail with On-Line Analyt...
Fadila Bentayeb, Cécile Favre
GECCO
2009
Springer
132views Optimization» more  GECCO 2009»
15 years 5 months ago
Bringing evolutionary computation to industrial applications with guide
Evolutionary Computation is an exciting research field with the power to assist researchers in the task of solving hard optimization problems (i.e., problems where the exploitabl...
Luís Da Costa, Marc Schoenauer
ICFEM
2009
Springer
15 years 5 months ago
Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language
Internet protocols encapsulate a significant amount of state, making implementing the host software complex. In this paper, we define the Statecall Policy Language (SPL) which pr...
Anil Madhavapeddy
IEAAIE
2009
Springer
15 years 5 months ago
An Agent Model of Temporal Dynamics in Relapse and Recurrence in Depression
Abstract Unipolar depression is a mental disorder characterized by a persistent low mood and loss of awareness or contentment in usual activities [1]. Despite the modern era of pha...
Azizi Ab Aziz, Michel C. A. Klein, Jan Treur
MOBISEC
2009
Springer
15 years 5 months ago
Filtering SPAM in P2PSIP Communities with Web of Trust
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasing...
Juho Heikkilä, Andrei Gurtov