Sciweavers

981 search results - page 124 / 197
» Negation in Spatial Reasoning
Sort
View
ASIACRYPT
2009
Springer
15 years 4 months ago
On the Analysis of Cryptographic Assumptions in the Generic Ring Model
At Eurocrypt 2009 Aggarwal and Maurer proved that breaking RSA is equivalent to factoring in the generic ring model. This model captures algorithms that may exploit the full algeb...
Tibor Jager, Jörg Schwenk
WEBI
2009
Springer
15 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
CLOUDCOM
2009
Springer
15 years 4 months ago
Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation
Abstract. Virtualization technology has become commonplace in modern data centers and cluster systems, often referred as “computing clouds”. In particular, the capability of vi...
William Voorsluys, James Broberg, Srikumar Venugop...
PERSUASIVE
2009
Springer
15 years 4 months ago
Designing empathic computers: the effect of multimodal empathic feedback using animated agent
Experiencing emotional distress is the number one reason why people who are undergoing behaviour modification (e.g. quitting smoking, dieting) suffer from relapses. Providing emot...
Hien Nguyen, Judith Masthoff
74
Voted
ACSAC
2008
IEEE
15 years 4 months ago
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks
Cross-site Scripting (XSS) has emerged to one of the most prevalent type of security vulnerabilities. While the reason for the vulnerability primarily lies on the serverside, the ...
Martin Johns, Björn Engelmann, Joachim Posegg...