Sciweavers

10021 search results - page 1789 / 2005
» Adaptive information extraction
Sort
View
91
Voted
HASE
2008
IEEE
15 years 1 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
126
Voted
IWCMC
2010
ACM
15 years 27 days ago
Policy-driven workflows for mobile network management automation
Future wireless networks will experience a continuous growth regarding the number of network elements with increasingly complex interrelations between the configuration of multipl...
Raphael Romeikat, Bernhard Bauer, Tobias Bandh, Ge...
122
Voted
MM
2010
ACM
157views Multimedia» more  MM 2010»
15 years 27 days ago
Interactive storytelling via video content recombination
In the paper we present a prototype of video-based storytelling that is able to generate multiple story variants from a baseline video. The video content for the system is generat...
Julie Porteous, Sergio Benini, Luca Canini, Fred C...
CCS
2010
ACM
15 years 27 days ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster
89
Voted
SIGCOMM
2010
ACM
15 years 27 days ago
Efficient error estimating coding: feasibility and applications
Motivated by recent emerging systems that can leverage partially correct packets in wireless networks, this paper investigates the novel concept of error estimating codes (EEC). W...
Binbin Chen, Ziling Zhou, Yuda Zhao, Haifeng Yu
« Prev « First page 1789 / 2005 Last » Next »