Sciweavers

1068 search results - page 204 / 214
» Group Dominant Strategies
Sort
View
CSFW
2003
IEEE
15 years 2 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
15 years 2 months ago
Creating a Scenariologic - Design and Application of a Repeatable Methodology
Context scenarios are widely used for assessing the robustness of strategies and policies in both the private and the public sector. Royal Dutch Shell, for instance, has become re...
Bert Enserink
SBACPAD
2003
IEEE
120views Hardware» more  SBACPAD 2003»
15 years 2 months ago
Comparison of Genomes Using High-Performance Parallel Computing
Comparison of the DNA sequences and genes of two genomes can be useful to investigate the common functionalities of the corresponding organisms and get a better understanding of h...
Nalvo F. Almeida Jr., Carlos E. R. Alves, Edson C&...
JCDL
2010
ACM
163views Education» more  JCDL 2010»
15 years 2 months ago
Flexible access to photo libraries via time, place, tags, and visual features
Photo libraries are growing in quantity and size, requiring better support for locating desired photographs. MediaGLOW is an interactive visual workspace designed to address this ...
Andreas Girgensohn, Frank Shipman, Thea Turner, Ly...
JCDL
2010
ACM
199views Education» more  JCDL 2010»
15 years 2 months ago
Crowdsourcing the assembly of concept hierarchies
The“wisdom of crowds”is accomplishing tasks that are cumbersome for individuals yet cannot be fully automated by means of specialized computer algorithms. One such task is the...
Kai Eckert, Mathias Niepert, Christof Niemann, Cam...