Sciweavers

10038 search results - page 1839 / 2008
» Model Checking for Managers
Sort
View
ESEM
2008
ACM
15 years 6 months ago
Phase distribution of software development effort
Effort distribution by phase or activity is an important but often overlooked aspect compared to other steps in the cost estimation process. Poor effort allocation is among the ma...
Ye Yang, Mei He, Mingshu Li, Qing Wang, Barry W. B...
ESORICS
2008
Springer
15 years 6 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
ESORICS
2008
Springer
15 years 6 months ago
A Framework for the Analysis of Mix-Based Steganographic File Systems
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Claudia Díaz, Carmela Troncoso, Bart Prenee...
EUC
2008
Springer
15 years 6 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...
ACISICIS
2010
IEEE
15 years 6 months ago
Temporal Dynamics in Music Listening Behavior: A Case Study of Online Music Service
Abstract--Although temporal context may significantly affect the popularity of items and user preference over items, traditional information filtering techniques such as recommende...
Chan Ho Park, Minsuk Kahng
« Prev « First page 1839 / 2008 Last » Next »