Sciweavers

2036 search results - page 7 / 408
» Using and Abusing XML
Sort
View
EDM
2008
110views Data Mining» more  EDM 2008»
15 years 1 months ago
A Response Time Model For Bottom-Out Hints as Worked Examples
Students can use an educational system's help in unexpected r example, they may bypass abstract hints in search of a concrete solution. This behavior has traditionally been la...
Benjamin Shih, Kenneth R. Koedinger, Richard Schei...
CEAS
2008
Springer
15 years 1 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
192
Voted
TDSC
2011
14 years 6 months ago
Nymble: Blocking Misbehaving Users in Anonymizing Networks
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sea...
112
Voted
ESORICS
2007
Springer
15 years 3 months ago
Pragmatic XML Access Control Using Off-the-Shelf RDBMS
As the XML model gets more popular, new needs arise to specify access control within XML model. Various XML access control models and enforcement methods have been proposed recentl...
Bo Luo, Dongwon Lee, Peng Liu
98
Voted
CRIWG
2009
15 years 23 days ago
MobMaps: Towards a Shared Environment for Collaborative Social Activism
Nowadays it is possible to disseminate information to the all world in real time using current communication tools supported mostly by the Internet. The work of several organizatio...
Luís Gens, Hugo Paredes, Paulo Martins, Ben...