Sciweavers

401 search results - page 74 / 81
» Web Application Bypass Testing
Sort
View
SIGECOM
2008
ACM
188views ECommerce» more  SIGECOM 2008»
14 years 9 months ago
Predicting trusts among users of online communities: an epinions case study
Trust between a pair of users is an important piece of information for users in an online community (such as electronic commerce websites and product review websites) where users ...
Haifeng Liu, Ee-Peng Lim, Hady Wirawan Lauw, Minh-...
EUROSYS
2008
ACM
15 years 6 months ago
BorderPatrol: isolating events for black-box tracing
Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be anal...
Eric Koskinen, John Jannotti
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
15 years 9 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
ICTAI
2009
IEEE
15 years 4 months ago
Preventing Unwanted Social Inferences with Classification Tree Analysis
A serious threat to user privacy in new mobile and web2.0 applications stems from ‘social inferences’. These unwanted inferences are related to the users’ identity, current ...
Sara Motahari, Sotirios G. Ziavras, Quentin Jones
ICDM
2007
IEEE
140views Data Mining» more  ICDM 2007»
15 years 1 months ago
Sequential Change Detection on Data Streams
Model-based declarative queries are becoming an attractive paradigm for interacting with many data stream applications. This has led to the development of techniques to accurately...
S. Muthukrishnan, Eric van den Berg, Yihua Wu