Sciweavers

3215 search results - page 591 / 643
» Content Models with Attitude
Sort
View
TKDE
2008
122views more  TKDE 2008»
14 years 11 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
JMM2
2007
96views more  JMM2 2007»
14 years 11 months ago
Software Watermarking Resilient to Debugging Attacks
Abstract— In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The softw...
Gaurav Gupta, Josef Pieprzyk
JPDC
2007
117views more  JPDC 2007»
14 years 11 months ago
Adversarial exploits of end-systems adaptation dynamics
Internet end-systems employ various adaptation mechanisms that enable them to respond adequately to legitimate requests in overload situations. Today, these mechanisms are incorpo...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
LOGCOM
2007
125views more  LOGCOM 2007»
14 years 11 months ago
Epistemic Actions as Resources
We provide algebraic semantics together with a sound and complete sequent calculus for information update due to epistemic actions. This semantics is flexible enough to accommoda...
Alexandru Baltag, Bob Coecke, Mehrnoosh Sadrzadeh
BMCBI
2004
124views more  BMCBI 2004»
14 years 11 months ago
The Molecular Pages of the mesotelencephalic dopamine consortium (DopaNet)
Background: DopaNet http://www.dopanet.org is a Systems Biology initiative that aims to investigate precisely and quantitatively all the aspects of neurotransmission in a specific...
Nicolas Le Novère, Marco Donizelli