Sciweavers

272 search results - page 49 / 55
» Exploring the acceptability envelope
Sort
View
DIAGRAMS
2010
Springer
15 years 3 months ago
Drawing Area-Proportional Venn-3 Diagrams with Convex Polygons
Abstract. Area-proportional Venn diagrams are a popular way of visualizing the relationships between data sets, where the set intersections have a specified numerical value. In th...
Peter Rodgers, Jean Flower, Gem Stapleton, John Ho...
108
Voted
EDBT
2009
ACM
106views Database» more  EDBT 2009»
15 years 3 months ago
AlphaSum: size-constrained table summarization using value lattices
Consider a scientist who wants to explore multiple data sets to select the relevant ones for further analysis. Since the visualization real estate may put a stringent constraint o...
K. Selçuk Candan, Huiping Cao, Yan Qi 0002,...
USS
2008
15 years 2 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
BROADNETS
2006
IEEE
15 years 1 months ago
On the Broadcast Storm Problem in Ad hoc Wireless Networks
Routing protocols developed for ad hoc wireless networks use broadcast transmission to either discover a route or disseminate information. More specifically, reactive routing proto...
Ozan K. Tonguz, Nawaporn Wisitpongphan, Jayendra S...
ECOOPW
2008
Springer
15 years 1 months ago
Equation-Based Object-Oriented Languages and Tools
EOOLT'2007 was the first edition of the ECOOP-EOOLT workshop. The workshop is intended to bring researchers associated with different equation-based object-oriented (EOO) mode...
Peter Fritzson, David Broman, François Cell...