Sciweavers

3451 search results - page 168 / 691
» Collaborative attack modeling
Sort
View
126
Voted
CSCW
1996
ACM
15 years 9 months ago
Hypermedia Structures and the Division of Labor in Meeting Room Collaboration
The type of collaboration for a group, whether working in parallel or collectively, is a style for a group influenced by many factors, among them the technology that the group wor...
Gloria Mark, Jörg M. Haake, Norbert A. Streit...
144
Voted
SIGIR
2008
ACM
15 years 5 months ago
Algorithmic mediation for collaborative exploratory search
We describe a new approach to information retrieval: algorithmic mediation for intentional, synchronous collaborative exploratory search. Using our system, two or more users with ...
Jeremy Pickens, Gene Golovchinsky, Chirag Shah, Pe...
USS
2010
15 years 2 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
CAISE
2008
Springer
15 years 7 months ago
Semi-Automated Model Synchronisation in SOM
Model-driven engineering is at the forefront among recent attempts to information systems development. Models are gradually refined from domain specific descriptions to more concre...
Christian Flender, Thomas Hettel, Michael Lawley, ...
CAISE
2009
Springer
15 years 11 months ago
P2S: A Methodology to Enable Inter-organizational Process Design through Web Services
Abstract. With the advent of Service Oriented Architecture organizations have experienced services as a platform-independent technology to develop and use simple internal applicati...
Devis Bianchini, Cinzia Cappiello, Valeria De Anto...