This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
: Large information bases that are used by several different users and applications accommodate the demands of their users more effectively, if they can be split into possibly over...
Multi-dimensional data indexing has received much attention in a centralized database. However, not so much work has been done on this topic in the context of Peerto-Peer systems....
H. V. Jagadish, Beng Chin Ooi, Quang Hieu Vu, Rong...
We present a new brain segmentation framework which we apply to T1-weighted magnetic resonance image segmentation. The innovation of the algorithm in comparison to the state-of-the...
Torsten Butz, Patric Hagmann, Eric Tardif, Reto Me...
We describe a framework of bootstrapped hypothesis testing for estimating the confidence in one web search engine outperforming another over any randomly sampled query set of a gi...
Eric C. Jensen, Steven M. Beitzel, Ophir Frieder, ...