Sciweavers

3451 search results - page 130 / 691
» Collaborative attack modeling
Sort
View
IFIP
2009
Springer
15 years 9 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
109
Voted
ICSE
2004
IEEE-ACM
16 years 2 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
AIED
2009
Springer
15 years 5 months ago
Modeling Helping Behavior in an Intelligent Tutor for Peer Tutoring
Giving effective help is an important collaborative skill that leads to improved learning for both the help-giver and help-receiver. Adding intelligent tutoring to student interact...
Erin Walker, Nikol Rummel, Kenneth R. Koedinger
AH
2006
Springer
15 years 8 months ago
Cross-Technique Mediation of User Models
Nowadays, the information overload highlights the importance of personalization systems providing services according to users' interests and needs, as expressed by their User ...
Shlomo Berkovsky, Tsvi Kuflik, Francesco Ricci
114
Voted
ACSC
2005
IEEE
15 years 8 months ago
A Two-Pronged Attack on the Dragon of Intractability
One approach to tractably finding a solution to an NP-complete optimisation problem is heuristic, where the solution is inexact but quickly found; another approach is to reduce t...
Stephen Gilmour, Mark Dras