Sciweavers

2129 search results - page 83 / 426
» Cutting-Edge Timing Analysis Techniques
Sort
View
IS
2007
14 years 9 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini
ACMDIS
2000
ACM
15 years 2 months ago
Rapid Ethnography: Time Deepening Strategies for HCI Field Research
Field research methods are useful in the many aspects of HumanComputer Interaction research, including gathering user requirements, understanding and developing user models, and n...
David R. Millen
ECOOP
2009
Springer
15 years 10 months ago
Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis
Pointer analyses derived from a Context-Free-Language (CFL) reachability formulation achieve very high precision, but they do not scale well to compute the points-to solution for a...
Guoqing Xu, Atanas Rountev, Manu Sridharan
ASUNAM
2009
IEEE
15 years 4 months ago
Harnessing Wisdom of the Crowds Dynamics for Time-Dependent Reputation and Ranking
—The “wisdom of the crowds” is a concept used to describe the utility of harnessing group behaviour, where user opinion evolves over time and the opinion of the masses collec...
Elizabeth M. Daly
IJNSEC
2008
117views more  IJNSEC 2008»
14 years 9 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin