Sciweavers

885 search results - page 74 / 177
» The Requirements of Methodologies for Developing Web Applica...
Sort
View
SP
2009
IEEE
129views Security Privacy» more  SP 2009»
15 years 6 months ago
CLAMP: Practical Prevention of Large-Scale Data Leaks
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...
VLDB
2005
ACM
125views Database» more  VLDB 2005»
15 years 5 months ago
Using Association Rules for Fraud Detection in Web Advertising Networks
Discovering associations between elements occurring in a stream is applicable in numerous applications, including predictive caching and fraud detection. These applications requir...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
IJDE
2002
159views more  IJDE 2002»
14 years 11 months ago
An Examination of Digital Forensic Models
Law enforcement is in a perpetual race with criminals in the application of digital technologies, and requires the development of tools to systematically search digital devices fo...
Mark Reith, Clint Carr, Gregg H. Gunsch
POPL
2005
ACM
16 years 5 days ago
From sequential programs to multi-tier applications by program transformation
Modern applications are designed in multiple tiers to separate concerns. Since each tier may run at a separate location, middleware is required to mediate access between tiers. Ho...
Matthias Neubauer, Peter Thiemann
MSWIM
2006
ACM
15 years 5 months ago
Performance modeling of critical event management for ubiquitous computing applications
A generic theoretical framework for managing critical events in ubiquitous computing systems is presented. The main idea is to automatically respond to occurrences of critical eve...
Tridib Mukherjee, Krishna M. Venkatasubramanian, S...