Sciweavers

1478 search results - page 240 / 296
» Modeling user activities in a large IPTV system
Sort
View
106
Voted
ISW
2004
Springer
15 years 7 months ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner
ECAI
2010
Springer
14 years 11 months ago
Social Recommendation with Interpersonal Influence
Social recommendation, that an individual recommends an item to another, has gained popularity and success in web applications such as online sharing and shopping services. It is l...
Junming Huang, Xueqi Cheng, Jiafeng Guo, Huawei Sh...
CHI
2006
ACM
16 years 1 months ago
GUESS: a language and interface for graph exploration
As graph models are applied to more widely varying fields, researchers struggle with tools for exploring and analyzing these structures. We describe GUESS, a novel system for grap...
Eytan Adar
CSFW
1999
IEEE
15 years 5 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 8 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...