Sciweavers

325 search results - page 65 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
ISI
2006
Springer
13 years 4 months ago
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so f...
Eric A. Bier, Edward W. Ishak, Ed Chi
MASS
2010
161views Communications» more  MASS 2010»
12 years 11 months ago
Mode switch - Adaptive use of delay-sensitive or energy-aware communication in IEEE 802.15.4-based networks
Abstract--We propose "mode switch", an adaptive loadsensitive solution that supports both an energy-efficient operation mode for transmitting normal sensor data and an Qo...
Feng Chen, Xiaoyu Tong, Edith Ngar, Falko Dressler
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
13 years 11 months ago
Framework for Establishing Enterprise Modeling in the Context of Collaborative Enterprises
Increased market dynamics, shorter product lifecycles and a higher customer involvement in product design have caused great changes to competitive conditions and many companies ar...
Thomas Knothe, Timo Kahl, Dieter Boell, Kristof Sc...
SIGSOFT
2008
ACM
14 years 5 months ago
Extended exceptions for contingencies and their implications for the engineering process
We observed a general problem of sequential programs, which often results in design and programming errors in industrial software engineering projects, and propose a solution appr...
Thorsten van Ellen, Wilhelm Hasselbring
JUCS
2008
113views more  JUCS 2008»
13 years 4 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella