Sciweavers

2550 search results - page 257 / 510
» The Meaning of Open Standards
Sort
View
ICSE
2009
IEEE-ACM
16 years 10 days ago
Listening to programmers - Taxonomies and characteristics of comments in operating system code
Innovations from multiple directions have been proposed to improve software reliability. Unfortunately, many of the innovations are not fully exploited by programmers. To bridge t...
Yoann Padioleau, Lin Tan, Yuanyuan Zhou
WWW
2006
ACM
16 years 6 days ago
Detecting semantic cloaking on the web
By supplying different versions of a web page to search engines and to browsers, a content provider attempts to cloak the real content from the view of the search engine. Semantic...
Baoning Wu, Brian D. Davison
WWW
2005
ACM
16 years 6 days ago
WebRogue: virtual presence in web sites
WebRogue is an application for virtual presence over the Web. It provides the Web Browser with a chat subwindow that allows users connected to the same Web site to meet, share opi...
Alessandro Soro, Ivan Marcialis, Davide Carboni, G...
EUROCRYPT
2009
Springer
16 years 3 days ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
15 years 12 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...