Sciweavers

17450 search results - page 323 / 3490
» Numerical Methods with Applications
Sort
View
JCDL
2011
ACM
244views Education» more  JCDL 2011»
14 years 7 months ago
Product review summarization from a deeper perspective
With product reviews growing in depth and becoming more numerous, it is growing challenge to acquire a comprehensive understanding of their contents, for both customers and produc...
Duy Khang Ly, Kazunari Sugiyama, Ziheng Lin, Min-Y...
AIHC
2007
Springer
15 years 10 months ago
Evaluating the Future of HCI: Challenges for the Evaluation of Emerging Applications
Current evaluation methods are inappropriate for emerging HCI applications. In this paper, we give three examples of these applications and show that traditional evaluation method...
Ronald Poppe, Rutger Rienks, Betsy van Dijk
EDOC
2007
IEEE
15 years 8 months ago
Automated Model-Based Configuration of Enterprise Java Applications
The decentralized process of configuring enterprise applications is complex and error-prone, involving multiple participants/roles and numerous configuration changes across multipl...
Jules White, Douglas C. Schmidt, Krzysztof Czarnec...
SICHERHEIT
2010
15 years 2 months ago
Quantifying the Attack Surface of a Web Application
Abstract: The attack surface of a system represents the exposure of application objects to attackers and is affected primarily by architecture and design decisions. Given otherwise...
Thomas Heumann, Sven Türpe, Jörg Keller
CCS
2005
ACM
15 years 10 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov