Sciweavers

1176 search results - page 170 / 236
» Exploiting Online Games
Sort
View
SIGMOD
2011
ACM
279views Database» more  SIGMOD 2011»
14 years 1 months ago
MOBIES: mobile-interface enhancement service for hidden web database
Many web databases are hidden behind form-based interfaces which are not always easy-to-use on mobile devices because of limitations such as small screen sizes, trickier text entr...
Xin Jin, Aditya Mone, Nan Zhang 0004, Gautam Das
CSCW
2012
ACM
13 years 6 months ago
Building a standpoints web to support decision-making in wikipedia
Although the Web enables large-scale collaboration, its potential to support group decision-making has not been fully exploited. My research aims to analyze, extract, and represen...
Jodi Schneider
RECSYS
2009
ACM
15 years 5 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...
ATAL
2007
Springer
15 years 4 months ago
Periodic real-time resource allocation for teams of progressive processing agents
In this paper, we focus on the problem of finding a periodic allocation strategy for teams of resource-bounded agents. We propose a real-time dynamic algorithm RTDA , that exploi...
Jilles Steeve Dibangoye, Abdel-Illah Mouaddib, Bra...
ACSAC
2004
IEEE
15 years 2 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia