Sciweavers

1154 search results - page 149 / 231
» Making Self-organizing Systems Secure
Sort
View
IEEESP
2006
108views more  IEEESP 2006»
14 years 9 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
SERVICES
2010
119views more  SERVICES 2010»
14 years 11 months ago
The Networked Environment for Music Analysis (NEMA)
Abstract--Conducting valid comparative evaluations of techniques in the field of Music Information Retrieval (MIR) presents particular challenges to MIR researchers due to issues o...
Kris West, Amit Kumar, Andrew Shirk, Guojun Zhu, J...
IJISEC
2007
87views more  IJISEC 2007»
14 years 9 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
IPPS
2008
IEEE
15 years 4 months ago
Multi-threaded data mining of EDGAR CIKs (Central Index Keys) from ticker symbols
This paper describes how use the Java Swing HTMLEditorKit to perform multi-threaded web data mining on the EDGAR system (Electronic DataGathering, Analysis, and Retrieval system)....
Dougal A. Lyon
SIGMOD
1995
ACM
148views Database» more  SIGMOD 1995»
15 years 1 months ago
Copy Detection Mechanisms for Digital Documents
In a digital library system, documents are available in digital form and therefore are more easily copied and their copyrights are more easily violated. This is a very serious pro...
Sergey Brin, James Davis, Hector Garcia-Molina