Sciweavers

3812 search results - page 625 / 763
» Combinations of TRAP Based Systems
Sort
View
63
Voted
ITICSE
2009
ACM
15 years 4 months ago
Software reuse and plagiarism: a code of practice
In general, university guidelines or policies on plagiarism are not sufficiently detailed to cope with the technical complexity of software. Software plagiarism can have a signiï¬...
J. Paul Gibson
ACSAC
2008
IEEE
15 years 4 months ago
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks
Cross-site Scripting (XSS) has emerged to one of the most prevalent type of security vulnerabilities. While the reason for the vulnerability primarily lies on the serverside, the ...
Martin Johns, Björn Engelmann, Joachim Posegg...
87
Voted
HICSS
2008
IEEE
163views Biometrics» more  HICSS 2008»
15 years 4 months ago
Building a Test Suite for Web Application Scanners
This paper describes the design of a test suite for thorough evaluation of web application scanners. Web application scanners are automated, black-box testing tools that examine w...
Elizabeth Fong, Romain Gaucher, Vadim Okun, Paul E...
HICSS
2008
IEEE
158views Biometrics» more  HICSS 2008»
15 years 4 months ago
Consensual Dynamics in Group Decision Making with Triangular Fuzzy Numbers
In this paper we study the modelling of consensus reaching in a ‘soft’ environment, i.e. when the individual testimonies are expressed as fuzzy preference relations. Here cons...
Mario Fedrizzi, Michele Fedrizzi, Ricardo A. Marqu...
HICSS
2008
IEEE
147views Biometrics» more  HICSS 2008»
15 years 4 months ago
Can Peer-to-Peer Networks Facilitate Information Sharing in Collaborative Learning?
Many peer-to-peer (P2P) networks have been widely used for file sharing. A peer acts both as a content provider and a consumer, and is granted autonomy to decide what content, wit...
Fu-ren Lin, Sheng-cheng Lin, Ying-fen Wang