Sciweavers

1171 search results - page 65 / 235
» Graph-Constrained Group Testing
Sort
View
ACNS
2005
Springer
138views Cryptology» more  ACNS 2005»
15 years 8 months ago
Indexing Information for Data Forensics
We introduce novel techniques for organizing the indexing structures of how data is stored so that alterations from an original version can be detected and the changed values speci...
Michael T. Goodrich, Mikhail J. Atallah, Roberto T...
INTERACT
2007
15 years 3 months ago
Characterizing the Diversity in Users' Perceptions
This paper proposes a novel approach to modeling the diversity in users’ perceptions, based on a mixture of qualitative and quantitative techniques: the Repertory Grid Technique ...
Evangelos Karapanos, Jean-Bernard Martens
ECIS
2004
15 years 3 months ago
To play, or not to play: building a learning environment through computer simulations
This article analyzes the impact of a computer simulation (business game) on the users' perceived learning. The theoretical model developed in this paper is derived from the ...
Luigi Proserpio, Magni Magni
ICAIL
2003
ACM
15 years 7 months ago
SHYSTER-MYCIN: A Hybrid Legal Expert System
SHYSTER-MYCIN combines a case-based legal expert system (SHYSTER) with a rule-based expert system (MYCIN) to form a hybrid legal expert system. MYCIN’s reporting has been improv...
Thomas A. O'Callaghan, James Popple, Eric McGreath
ICSM
2002
IEEE
15 years 7 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz