Sciweavers

143 search results - page 20 / 29
» Detecting group activities using rigidity of formation
Sort
View
DSS
2007
124views more  DSS 2007»
14 years 9 months ago
Access control in collaborative commerce
Corporate collaboration allows organizations to improve the efficiency and quality of their business activities. It may occur as a workflow collaboration, a supply chain collabora...
Eldon Y. Li, Timon C. Du, Jacqueline W. Wong
IASSE
2004
14 years 11 months ago
A Rationale-based Analysis Tool
The Rationale-based Analysis Tool (RAT) supports analysts, developers, clients and end users during the objectoriented requirements analysis activity. The tool enables different s...
Timo Wolf, Allen H. Dutoit
IH
2007
Springer
15 years 3 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath
RAID
2010
Springer
14 years 7 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
AIIA
2007
Springer
15 years 3 months ago
A Hierarchical Clustering Procedure for Semantically Annotated Resources
Abstract. A clustering method is presented which can be applied to relational knowledge bases. It can be used to discover interesting groupings of resources through their (semantic...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito