Sciweavers

18090 search results - page 3412 / 3618
» Computing by Only Observing
Sort
View
ICSE
2008
IEEE-ACM
16 years 5 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
SIGSOFT
2005
ACM
16 years 5 months ago
Applying classification techniques to remotely-collected program execution data
There is an increasing interest in techniques that support measurement and analysis of fielded software systems. One of the main goals of these techniques is to better understand ...
Murali Haran, Alan F. Karr, Alessandro Orso, Adam ...
SIGSOFT
2003
ACM
16 years 5 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
WWW
2009
ACM
16 years 5 months ago
Social search in "Small-World" experiments
The "algorithmic small-world hypothesis" states that not only are pairs of individuals in a large social network connected by short paths, but that ordinary individuals ...
Sharad Goel, Roby Muhamad, Duncan J. Watts
154
Voted
WWW
2008
ACM
16 years 5 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
« Prev « First page 3412 / 3618 Last » Next »