Sciweavers

280 search results - page 28 / 56
» Early Aspects Refactoring
Sort
View
DSN
2005
IEEE
15 years 3 months ago
Towards a Theory of Insider Threat Assessment
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their famil...
Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Sham...
ECBS
2005
IEEE
58views Hardware» more  ECBS 2005»
15 years 3 months ago
MoDeII: Modeling and Analyzing Time-Constraints
The fulfillment of time requirements is one of the major acceptance criteria of safety-critical and real-time systems. They are dictated by the environment of these systems and a...
Jewgenij Botaschanjan, Jan Jürjens
WMTE
2005
IEEE
15 years 3 months ago
Lifeblog: A New Concept in Mobile Learning?
In this paper we report early findings from a sample of Australian participants using Nokia’s Lifeblog software on mobile phones to record aspects of living and learning in both...
Elizabeth Hartnell-Young, Frank Vetere
CAISE
2005
Springer
15 years 3 months ago
A Generic Model for Integrated Multi-Channel Information Systems
Abstract. There is an increasing need to provide methods for describing information systems which incorporate the integrated use of multiple channels of interaction. To achieve thi...
Richard Cooper, XianQing Wu
ISI
2005
Springer
15 years 3 months ago
An Ontological Approach to the Document Access Problem of Insider Threat
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...