Sciweavers

751 search results - page 112 / 151
» Ur Web: A Simple Model for Programming the Web
Sort
View
ACSAC
2004
IEEE
15 years 2 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
IRCDL
2008
15 years 12 days ago
Video Event Annotation using Ontologies with Temporal Reasoning
Annotation and retrieval tools for multimedia digital libraries have to cope with the complexity of multimedia content. In particular, when dealing with video content, annotation ...
Marco Bertini, Alberto Del Bimbo, Giuseppe Serra
PST
2004
15 years 10 days ago
Determining Internet Users' Values for Private Information
We examine the problem of determining a user's value for his/her private information. Web businesses often offer rewards, such as discounts, free downloads and website persona...
Scott Buffett, Nathan Scott, Bruce Spencer, Michae...
DATESO
2010
96views Database» more  DATESO 2010»
14 years 9 months ago
A Framework for Efficient Design, Maintaining, and Evolution of a System of XML Applications
Abstract. The today's applications usually form a system of sub-applications, each being responsible for a particular functionality. Hence, the design and maintenance of such ...
Martin Necaský, Irena Mlýnková...
OOPSLA
2009
Springer
15 years 5 months ago
Coherent reaction
Side effects are both the essence and bane of imperative programming. The programmer must carefully coordinate actions to manage their side effects upon each other. Such coordinat...
Jonathan Edwards