نتایج جستجو برای: exploitations

تعداد نتایج: 442  

2011

Social networking sites such as Facebook and Twitter have gained more popularity in recent years. Because of its large user base, and large amount of information, they become a potential channel for attackers to exploit. Many social networking sites try to prevent those exploitations, but many attackers are still able to overcome those security countermeasures by using different techniques. Soc...

2000
Carsten Tautz Klaus-Dieter Althoff Markus Nick

The explicit management of project experience (lessons learned on project planning and execution) has become of strategic importance to many organizations. This paper describes how to set-up and run a case-based repository for sharing project experience using an industrial-strength case study. The case study shows that it is both effective and efficient for the information seeker to have an exp...

2003
Xuan-Ha Vu Djamila Sam-Haroud Boi Faltings

This paper considers the issue of preprocessing the output of interval-based solvers for further exploitations when solving numerical CSPs with continuum of solutions. Most interval-based solvers cover the solution sets of such problems with a large collection of boxes. This makes it difficult to exploit their results for other purposes than simple querying. For many practical problems, it is h...

2011

Social networking sites such as Facebook and Twitter have gained more popularity in recent years. Because of its large user base, and large amount of information, they become a potential channel for attackers to exploit. Many social networking sites try to prevent those exploitations, but many attackers are still able to overcome those security countermeasures by using different techniques. Soc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید