Sciweavers

5634 search results - page 946 / 1127
» About Abstract Classes
Sort
View
153
Voted
SICHERHEIT
2010
15 years 2 months ago
Quantifying the Attack Surface of a Web Application
Abstract: The attack surface of a system represents the exposure of application objects to attackers and is affected primarily by architecture and design decisions. Given otherwise...
Thomas Heumann, Sven Türpe, Jörg Keller
SRDS
2010
IEEE
15 years 2 months ago
Shedding Light on Enterprise Network Failures Using Spotlight
Abstract--Fault localization in enterprise networks is extremely challenging. A recent approach called Sherlock makes some headway into this problem by using an inference algorithm...
Dipu John, Pawan Prakash, Ramana Rao Kompella, Ran...
WINE
2010
Springer
174views Economy» more  WINE 2010»
15 years 2 months ago
Value of Learning in Sponsored Search Auctions
Abstract. The standard business model in the sponsored search marketplace is to sell click-throughs to the advertisers. This involves running an auction that allocates advertisemen...
Sai-Ming Li, Mohammad Mahdian, Randolph Preston Mc...
GD
2009
Springer
15 years 2 months ago
Algebraic Methods for Counting Euclidean Embeddings of Rigid Graphs
Abstract. The study of (minimally) rigid graphs is motivated by numerous applications, mostly in robotics and bioinformatics. A major open problem concerns the number of embeddings...
Ioannis Z. Emiris, Elias P. Tsigaridas, Antonios V...
147
Voted
GLOBECOM
2009
IEEE
15 years 2 months ago
Measurements of Multicast Service Discovery in a Campus Wireless Network
Abstract--Applications using multicast service discovery protocols, such as iTunes, have become increasingly popular. However, multicast service discovery protocols generate signif...
Se Gi Hong, Suman Srinivasan, Henning Schulzrinne