Sciweavers

452 search results - page 57 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
WLP
2005
Springer
15 years 3 months ago
Expressing Interaction in Combinatorial Auction through Social Integrity Constraints
Abstract. Combinatorial Auctions are an attractive application of intelligent agents; their applications are countless and are shown to provide good revenues. On the other hand, on...
Marco Alberti, Federico Chesani, Alessio Guerri, M...
ICSE
2000
IEEE-ACM
15 years 1 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
MM
2010
ACM
174views Multimedia» more  MM 2010»
14 years 10 months ago
Personalized photograph ranking and selection system
In this paper, we propose a novel personalized ranking system for amateur photographs. Although some of the features used in our system are similar to previous work, new features,...
Che-Hua Yeh, Yuan-Chen Ho, Brian A. Barsky, Ming O...
80
Voted
SP
2006
IEEE
169views Security Privacy» more  SP 2006»
15 years 3 months ago
A Safety-Oriented Platform for Web Applications
The Web browser has become the dominant interface to a broad range of applications, including online banking, Web-based email, digital media delivery, gaming, and ecommerce servic...
Richard S. Cox, Steven D. Gribble, Henry M. Levy, ...
ESCIENCE
2006
IEEE
15 years 3 months ago
A Synchronous Multimedia Annotation System for Secure Collaboratories
In this paper, we describe the Vannotea system - an application designed to enable collaborating groups to discuss and annotate collections of high quality images, video, audio or...
Ronald Schroeter, Jane Hunter, Jonathon Guerin, Im...