Sciweavers

367 search results - page 37 / 74
» Performance Analysis and Evaluation of VDSL2 Systems: Band-P...
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 4 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
DGO
2008
188views Education» more  DGO 2008»
14 years 11 months ago
Enabling synergy between psychology and natural language processing for e-Government: crime reporting and investigative intervie
We are developing an automated crime reporting and investigative interview system. The system incorporates cognitive interview techniques to maximize witness memory recall, and in...
Alicia Iriberri, Chih Hao Ku, Gondy Leroy
ASPLOS
2006
ACM
15 years 3 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
RE
2010
Springer
14 years 8 months ago
Assessing traceability of software engineering artifacts
Abstract The generation of traceability links or traceability matrices is vital to many software engineering activities. It is also person-power intensive, time-consuming, error-pr...
Senthil Karthikeyan Sundaram, Jane Huffman Hayes, ...
IGARSS
2009
14 years 7 months ago
Rapid Detection of Agricultural Food Crop Contamination via Hyperspectral Remote Sensing
In this study, the authors investigate the use of hyperspectral imaging for food crop monitoring and contamination detection and characterization. The authors investigate the use ...
Terrance West, Lori M. Bruce, Saurabh Prasad, Dani...