Sciweavers

3497 search results - page 97 / 700
» Making Distributed Applications Robust
Sort
View
CCS
2008
ACM
15 years 4 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
GECCO
2008
Springer
163views Optimization» more  GECCO 2008»
15 years 3 months ago
Embedded evolutionary multi-objective optimization for worst case robustness
In Multi-Objective Problems (MOPs) involving uncertainty, each solution might be associated with a cluster of performances in the objective space depending on the possible scenari...
Gideon Avigad, Jürgen Branke
PR
2008
141views more  PR 2008»
15 years 2 months ago
Robust and efficient multiclass SVM models for phrase pattern recognition
Phrase pattern recognition (phrase chunking) refers to automatic approaches for identifying predefined phrase structures in a stream of text. Support vector machines (SVMs)-based ...
Yu-Chieh Wu, Yue-Shi Lee, Jie-Chi Yang
137
Voted
TNN
2010
148views Management» more  TNN 2010»
14 years 9 months ago
A fast algorithm for robust mixtures in the presence of measurement errors
Abstract--In experimental and observational sciences, detecting atypical, peculiar data from large sets of measurements has the potential of highlighting candidates of interesting ...
Jianyong Sun, Ata Kabán
149
Voted
PERVASIVE
2007
Springer
15 years 8 months ago
PersonisAD: Distributed, Active, Scrutable Model Framework for Context-Aware Services
Abstract. PersonisAD, is a framework for building context-aware, ubiquitous applications: its defining foundation is a consistent mechanism for scrutable modelling of people, sens...
Mark Assad, David J. Carmichael, Judy Kay, Bob Kum...