Sciweavers

3318 search results - page 497 / 664
» The Weak Instance Model
Sort
View
UM
2007
Springer
15 years 6 months ago
Users in Volatile Communities: Studying Active Participation and Community Evolution
Active participation of a person in a community is a powerful indicator of the person's interests, preferences, beliefs and (often) social and demographic context. Community m...
Tanja Falkowski, Myra Spiliopoulou
122
Voted
VOTEID
2007
Springer
15 years 6 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
ACSAC
2006
IEEE
15 years 6 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
IPPS
2006
IEEE
15 years 6 months ago
Dynamic performance prediction of an adaptive mesh application
While it is possible to accurately predict the execution time of a given iteration of an adaptive application, it is not generally possible to predict the data-dependent adaptive ...
Mark M. Mathis, Darren J. Kerbyson
WOWMOM
2006
ACM
137views Multimedia» more  WOWMOM 2006»
15 years 6 months ago
Evaluating Context Information Predictability for Autonomic Communication
Delay tolerant and mobile ad hoc networks, present considerable challenges to the development of protocols and systems. In particular, the challenge of being able to cope with the...
Mirco Musolesi, Cecilia Mascolo