Sciweavers

804 search results - page 53 / 161
» Analysis of Web Alert Models
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 7 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
DOCENG
2010
ACM
14 years 10 months ago
Contextual advertising for web article printing
: Contextual Advertising for Web Article Printing Shengwen Yang, Jianming Jin, Parag Joshi, Sam Liu HP Laboratories HPL-2010-79 printed ad, web printing, article extraction, conte...
Shengwen Yang, Jianming Jin, Joshi Parag, Sam Liu
IAT
2008
IEEE
15 years 4 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
TGC
2007
Springer
15 years 3 months ago
Replicating Web Services for Scalability
Web service instances are often replicated to allow service provision to scale to support larger population sizes of users. However, such systems are difficult to analyse because t...
Mario Bravetti, Stephen Gilmore, Claudio Guidi, Mi...
VLDB
2007
ACM
161views Database» more  VLDB 2007»
15 years 3 months ago
Reasoning about the Behavior of Semantic Web Services with Concurrent Transaction Logic
The recent upsurge in the interest in Semantic Web services and the high-profile projects such as the WSMO, OWLS, and SWSL, have drawn attention to the importance of logic-based ...
Dumitru Roman, Michael Kifer