Sciweavers

54 search results - page 10 / 11
» Security Design Patterns: Survey and Evaluation
Sort
View
TDSC
2010
160views more  TDSC 2010»
13 years 20 days ago
Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Edge services allow clients to access Internet service...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...
ICSE
2012
IEEE-ACM
11 years 8 months ago
Debugger Canvas: Industrial experience with the code bubbles paradigm
—At ICSE 2010, the Code Bubbles team from Brown University and the Code Canvas team from Microsoft Research presented similar ideas for new user experiences for an integrated dev...
Robert DeLine, Andrew Bragdon, Kael Rowan, Jens Ja...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 9 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
13 years 12 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
VIS
2007
IEEE
164views Visualization» more  VIS 2007»
14 years 7 months ago
Contextualized Videos: Combining Videos with Environment Models to Support Situational Understanding
Multiple spatially-related videos are increasingly used in security, communication, and other applications. Since it can be difficult to understand the spatial relationships betwee...
Yi Wang, David A. Krum, Enylton M. Coelho, Doug...