Sciweavers

1733 search results - page 255 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
CSFW
2007
IEEE
15 years 4 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
CHI
2005
ACM
15 years 10 months ago
Digital Family Portrait Field Trial: Support for Aging in Place
A growing social problem in the U.S., and elsewhere, is enabling older adults to continue living independently, as opposed to moving to an institutional care setting. One key part...
Jim Rowan, Elizabeth D. Mynatt
CHI
2005
ACM
15 years 10 months ago
Connecting with kids: so what's new?
From pre-schools to high schools, at home and in museums, the educational community has embraced the use of computers as a teaching tool. Yet many institutions will simply install...
Lori L. Scarlatos, Amy Bruckman, Allison Druin, Mi...
WWW
2003
ACM
15 years 10 months ago
The chatty web: emergent semantics through gossiping
This paper describes a novel approach for obtaining semantic interoperability among data sources in a bottom-up, semiautomatic manner without relying on pre-existing, global seman...
Karl Aberer, Manfred Hauswirth, Philippe Cudr&eacu...
ICDE
2012
IEEE
285views Database» more  ICDE 2012»
13 years 11 days ago
Multidimensional Analysis of Atypical Events in Cyber-Physical Data
— A Cyber-Physical System (CPS) integrates physical devices (e.g., sensors, cameras) with cyber (or informational) components to form a situation-integrated analytical system tha...
Lu An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Wen...