Sciweavers

3003 search results - page 476 / 601
» Software Security: Building Security In
Sort
View
ACISP
1997
Springer
15 years 8 months ago
Enabling Technology for the Trading of MPEG-encoded Video
tracts, pp. 11-17. (http://www.qucis.queens.ca/achallc97/papers/p028.html) Alexa, Melina; Rostek, Lothar Pattern Concordances - TATOE calls XGrammar. Presented at ACH -ALLC97, King...
Jana Dittmann, Arnd Steinmetz
ACMSE
2009
ACM
15 years 11 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
OOPSLA
2005
Springer
15 years 10 months ago
Ercatons and organic programming: say good-bye to planned economy
Organic programming (OP) is our proposed and already emerging programming model which overcomes some of the limitations of current practice in software development in general and ...
Oliver Imbusch, Falk Langhammer, Guido von Walter
ICWE
2004
Springer
15 years 9 months ago
WebRatio, an Innovative Technology for Web Application Development
A data–intensive Web application is a Web-enabled software system for the publication and management of large data collections, typically stored in one or more database manageme...
Roberto Acerbis, Aldo Bongio, Stefano Butti, Stefa...
WWW
2007
ACM
16 years 5 months ago
Detectives: detecting coalition hit inflation attacks in advertising networks streams
Click fraud is jeopardizing the industry of Internet advertising. Internet advertising is crucial for the thriving of the entire Internet, since it allows producers to advertise t...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi