Sciweavers

405 search results - page 55 / 81
» Avatar-centric Risk Evaluation
Sort
View
SAC
2010
ACM
15 years 4 months ago
Checking concurrent contracts with aspects
The applicability of aspects as a means of implementing runtime contract checking has been demonstrated in prior work, where contracts are identified as cross-cutting concerns [1...
Eric Kerfoot, Steve McKeever
HICSS
2009
IEEE
120views Biometrics» more  HICSS 2009»
15 years 4 months ago
Trapping Malicious Insiders in the SPDR Web
The insider threat has assumed increasing importance as our dependence on critical cyber information infrastructure has increased. In this paper we describe an approach for thwart...
J. Thomas Haigh, Steven A. Harp, Richard C. O'Brie...
CIDM
2009
IEEE
15 years 4 months ago
Large-scale attribute selection using wrappers
Abstract— Scheme-specific attribute selection with the wrapper and variants of forward selection is a popular attribute selection technique for classification that yields good ...
Martin Gutlein, Eibe Frank, Mark Hall, Andreas Kar...
ICNP
2009
IEEE
15 years 4 months ago
Multipath load-adaptive routing: putting the emphasis on robustness and simplicity
— We propose a routing and load-balancing approach with the primary goal of being robust to sudden topological changes and significant traffic matrix variations. The proposed m...
Amund Kvalbein, Constantine Dovrolis, Chidambaram ...
ICST
2009
IEEE
15 years 4 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya