Sciweavers

5766 search results - page 1130 / 1154
» Reverse Engineering of Data
Sort
View
APWEB
2009
Springer
15 years 1 months ago
Ontology Evaluation through Text Classification
We present a new method to evaluate a search ontology, which relies on mapping ontology instances to textual documents. On the basis of this mapping, we evaluate the adequacy of on...
Yael Dahan Netzer, David Gabay, Meni Adler, Yoav G...
ICDCS
2010
IEEE
15 years 1 months ago
Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China
Abstract—We present results from measurements of the filtering of HTTP HTML responses in China, which is based on string matching and TCP reset injection by backbone-level route...
Jong Chun Park, Jedidiah R. Crandall
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
15 years 1 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
15 years 1 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
ECBS
2009
IEEE
114views Hardware» more  ECBS 2009»
15 years 1 months ago
Model-Based Product-Oriented Certification
Future space missions such as the Mars Science Laboratory and Project Constellation suggest the engineering of some of the most complex man-rated software systems. The present pro...
Damian Dechev, Bjarne Stroustrup
« Prev « First page 1130 / 1154 Last » Next »