Sciweavers

4048 search results - page 245 / 810
» Design Science, Engineering Science and Requirements Enginee...
Sort
View
ECIR
2009
Springer
16 years 1 months ago
Combination of Documents Features Based on Simulated Click-through Data
Many different ranking algorithms based on content and context have been used in web search engines to find pages based on a user query. Furthermore, to achieve better performance ...
Ali Mohammad Zareh Bidoki, James A. Thom
HICSS
2009
IEEE
124views Biometrics» more  HICSS 2009»
15 years 11 months ago
Case Studies of an Insider Framework
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
ESEM
2009
ACM
15 years 11 months ago
Cognitive factors in perspective-based reading (PBR): A protocol analysis study
The following study investigated cognitive factors involved in applying the Perspective-Based Reading (PBR) technique for defect detection in software inspections. Using the proto...
Bryan Robbins, Jeff Carver
IH
2001
Springer
15 years 9 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
ADAEUROPE
1997
Springer
15 years 8 months ago
The SPIF Project
This paper introduces the current developments of the SPIF (Syst`eme de Prototypage `a Implantation rapide et Faible coˆut) project. The goal of SPIF is to provide a low cost envi...
Bertrand Dupouy, Olivier Hainque, Laurent Pautet, ...