Sciweavers

10689 search results - page 71 / 2138
» How informances can be used in design ethnography
Sort
View
CSFW
2000
IEEE
15 years 2 months ago
How to Prevent Type Flaw Attacks on Security Protocols
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number o...
James Heather, Gavin Lowe, Steve Schneider
ACISICIS
2007
IEEE
15 years 4 months ago
Slicing Aided Design of Obfuscating Transforms
Abstract—An obfuscation aims to transform a program, without affecting its functionality, so that some secret information within the program can be hidden for as long as possible...
Stephen Drape, Anirban Majumdar, Clark D. Thombors...
HT
2005
ACM
15 years 3 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver
TVCG
2008
96views more  TVCG 2008»
14 years 9 months ago
Distributed Cognition as a Theoretical Framework for Information Visualization
Even though information visualization (InfoVis) research has matured in recent years, it is generally acknowledged that the field still lacks supporting, encompassing theories. In ...
Zhicheng Liu, Nancy J. Nersessian, John T. Stasko
SCIE
1997
Springer
15 years 2 months ago
Semantic Matching: Formal Ontological Distinctions for Information Organization, Extraction, and Integration
Abstract. The task of information extraction can be seen as a problem of semantic matching between a user-defined template and a piece of information written in natural language. T...
Nicola Guarino