Sciweavers

274 search results - page 54 / 55
» Secure Information Flow as Typed Process Behaviour
Sort
View
CHI
2010
ACM
14 years 19 days ago
d.note: revising user interfaces through change tracking, annotations, and alternatives
Interaction designers typically revise user interface prototypes by adding unstructured notes to storyboards and screen printouts. How might computational tools increase the effic...
Björn Hartmann, Sean Follmer, Antonio Ricciar...
DGO
2008
112views Education» more  DGO 2008»
13 years 6 months ago
Mapping theory to practice: a cartographic analysis of public safety networks
This paper provides an interim report on ongoing data collection and analysis efforts as part of a large-scale study of information technology- focused interagency collaborations ...
Christine B. Williams, M. Lynne Markus, Michael Ty...
DEBS
2007
ACM
13 years 7 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 5 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
SAC
2003
ACM
13 years 11 months ago
Systems Architecture for Pervasive Retail
Recent developments in mobile technologies and associated economies of scale via mature manufacturing processes have made possible the construction of pervasive systems in specifi...
George Roussos, Panos Kourouthanasis, Eugene A. Gr...