Sciweavers

395 search results - page 62 / 79
» Practices and Cultures of Knowledge Management
Sort
View
RAID
2010
Springer
15 years 8 days ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
CHI
2007
ACM
16 years 2 months ago
Studying activity patterns in CSCW
We study small distributed work groups capturing, managing, and reusing knowledge in a collaborative activity. We conceive this process as adaptation of a group to an activity and...
Gregorio Convertino, Thomas P. Moran, Barton A. Sm...
ICSE
2007
IEEE-ACM
16 years 1 months ago
Mining Software Engineering Data
Software engineering data (such as code bases, execution traces, historical code changes, mailing lists, and bug databases) contains a wealth of information about a project's...
Tao Xie, Jian Pei, Ahmed E. Hassan
117
Voted
CCS
2010
ACM
15 years 8 months ago
Bureaucratic protocols for secure two-party sorting, selection, and permuting
In this paper, we introduce a framework for secure two-party (S2P) computations, which we call bureaucratic computing, and we demonstrate its efficiency by designing practical S2P...
Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenlia...
100
Voted
ICDIM
2007
IEEE
15 years 8 months ago
Control validation of D.E.S systems: Application to remote laboratories
Objectives of Automation courses are knowledge and know-how transfer to students. It is important for learner to control locally or remotely real systems composed of many sensors ...
Pascale Marange, François Gellot, Bernard R...