Sciweavers

3608 search results - page 249 / 722
» computer 2011
Sort
View
SAC
2011
ACM
14 years 7 months ago
Reliable protection against session fixation attacks
The term ‘Session Fixation vulnerability’ subsumes issues in Web applications that under certain circumstances enable the adversary to perform a Session Hijacking attack throu...
Martin Johns, Bastian Braun, Michael Schrank, Joac...
AAAI
2011
14 years 4 months ago
Lossy Conservative Update (LCU) Sketch: Succinct Approximate Count Storage
In this paper, we propose a variant of the conservativeupdate Count-Min sketch to further reduce the overestimation error incurred. Inspired by ideas from lossy counting, we divid...
Amit Goyal, Hal Daumé III
ACII
2011
Springer
14 years 4 months ago
A Game-Based Corpus for Analysing the Interplay between Game Context and Player Experience
Recognizing players’ affective state while playing video games has been the focus of many recent research studies. In this paper we describe the process that has been followed t...
Noor Shaker, Stylianos Asteriadis, Georgios N. Yan...
EDOC
2011
IEEE
14 years 4 months ago
Value-Based Service Bundling: A Customer-Supplier Approach
Abstract—Due to future ubiquitous service environments, approaches for dynamic delivery of services face new challenges. Since the web 2.0 gave to customers the change to interac...
Iván S. Razo-Zapata, Pieter De Leenheer, Ja...
COMPGEOM
2011
ACM
14 years 8 months ago
An output-sensitive algorithm for persistent homology
In this paper, we present the first output-sensitive algorithm to compute the persistence diagram of a filtered simplicial complex. For any Γ > 0, it returns only those homo...
Chao Chen, Michael Kerber