Sciweavers

3077 search results - page 452 / 616
» Research issues
Sort
View
DIMVA
2010
15 years 7 months ago
Evaluating Bluetooth as a Medium for Botnet Command and Control
Abstract. Malware targeting mobile phones is being studied with increasing interest by the research community. While such attention has previously focused on viruses and worms, man...
Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Tr...
DIMVA
2010
15 years 7 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
148
Voted
ECIR
2010
Springer
15 years 7 months ago
Query Performance Prediction: Evaluation Contrasted with Effectiveness
Query performance predictors are commonly evaluated by reporting correlation coefficients to denote how well the methods perform at predicting the retrieval performance of a set of...
Claudia Hauff, Leif Azzopardi, Djoerd Hiemstra, Fr...
ICWS
2010
IEEE
15 years 7 months ago
Script-Based Generation of Dynamic Testbeds for SOA
This paper addresses one of the major problems of SOA software development: the lack of support for testing complex service-oriented systems. The research community has developed v...
Lukasz Juszczyk, Schahram Dustdar
DAGSTUHL
2007
15 years 7 months ago
Correlation-based Data Representation
The Dagstuhl Seminar Similarity-based Clustering and its Application to Medicine and Biology (07131) held in March 25–30, 2007, provided an excellent atmosphere for in-depth disc...
Marc Strickert, Udo Seiffert