Sciweavers

371 search results - page 17 / 75
» Template Based Semantic Similarity for Security Applications
Sort
View
130
Voted
ITRUST
2004
Springer
15 years 3 months ago
Analyzing Correlation between Trust and User Similarity in Online Communities
Abstract. Past evidence has shown that generic approaches to recommender systems based upon collaborative filtering tend to poorly scale. Moreover, their fitness for scenarios su...
Cai-Nicolas Ziegler, Georg Lausen
EUROPAR
2005
Springer
15 years 3 months ago
Epidemic-Style Management of Semantic Overlays for Content-Based Searching
A lot of recent research on content-based P2P searching for file-sharing applications has focused on exploiting semantic relations between peers to facilitate searching. To the be...
Spyros Voulgaris, Maarten van Steen
72
Voted
AGENTS
2000
Springer
15 years 2 months ago
Frameworks for Reasoning about Agent Based Systems
This paper suggests formal frameworks that can be used as the basis for defining, reasoning about, and verifying properties of agent systems. The language, Little-JIL is graphical...
Leon J. Osterweil, Lori A. Clarke
79
Voted
PST
2008
14 years 11 months ago
Cross-Language Weaving Approach Targeting Software Security Hardening
In this paper, we propose an approach for systematic security hardening of software based on aspect-oriented programming and Gimple language. We also present the first steps towar...
Azzam Mourad, Dima Alhadidi, Mourad Debbabi
68
Voted
VLDB
2002
ACM
74views Database» more  VLDB 2002»
14 years 9 months ago
Provisions and Obligations in Policy Management and Security Applications
Policies are widely used in many systems and applications. Recently, it has been recognized that a "yes/no" response to every scenario is just not enough for many modern...
Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wan...