Sciweavers

HICSS
2010
IEEE
114views Biometrics» more  HICSS 2010»
13 years 6 months ago
Measuring Similarity for Security Vulnerabilities
Ju An Wang, Linfeng Zhou, Minzhe Guo, Hao Wang, Ja...
HICSS
2010
IEEE
200views Biometrics» more  HICSS 2010»
13 years 6 months ago
Instability of Relevance-Ranked Results Using Latent Semantic Indexing for Web Search
1 The latent semantic indexing (LSI) methodology for information retrieval applies the singular value decomposition to identify an eigensystem for a large matrix, in which cells re...
Houssain Kettani, Gregory B. Newby
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
13 years 6 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
HICSS
2010
IEEE
176views Biometrics» more  HICSS 2010»
13 years 6 months ago
Development of the Smart Grid: Missing Elements in the Policy Process
This paper seeks to frame one aspect of the Smart Grid discussion which has been under-recognized in regulatory and policy debates. Significant discussion has focused Smart Grid a...
Richard D. Tabors, Geoffrey Parker, Michael C. Car...
HICSS
2010
IEEE
154views Biometrics» more  HICSS 2010»
13 years 6 months ago
On Mapping Business Document Models to Core Components
Today, there exists a huge variety of business document models for electronic data exchange among business partners used in business-to-business, business-to-government, as well a...
Michael Strommer, Christian Pichler, Philipp Liegl
HICSS
2010
IEEE
171views Biometrics» more  HICSS 2010»
13 years 8 months ago
Service Oriented Device Integration - An Analysis of SOA Design Patterns
Service oriented device architecture (SODA) is a promising approach for overcoming interoperability issues and especially for extending the IT support of business processes to dev...
Christian Mauro, Jan Marco Leimeister, Helmut Krcm...
HICSS
2010
IEEE
166views Biometrics» more  HICSS 2010»
13 years 8 months ago
VrtProf: Vertical Profiling for System Virtualization
As data centers and end users become increasingly reliant on virtualization technology, more efficient and accurate methods of profiling such systems are needed. However, under vir...
Hussam Mousa, Kshitij Doshi, Timothy Sherwood, ElM...
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
13 years 9 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
13 years 9 months ago
SafeFox: A Safe Lightweight Virtual Browsing Environment
1 The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected ...
Jiang Wang, Yih Huang, Anup K. Ghosh