Sciweavers

2784 search results - page 290 / 557
» Relation Extraction with Relation Topics
Sort
View
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 11 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
127
Voted
ACSC
2009
IEEE
15 years 11 months ago
Microdata Protection Through Approximate Microaggregation
Microdata protection is a hot topic in the field of Statistical Disclosure Control, which has gained special interest after the disclosure of 658000 queries by the America Online...
Xiaoxun Sun, Hua Wang, Jiuyong Li
IEEEARES
2009
IEEE
15 years 11 months ago
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation
Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
SEMCO
2009
IEEE
15 years 11 months ago
Enhanced Multimedia Content Access and Exploitation Using Semantic Speech Retrieval
—Techniques for automatic annotation of spoken content making use of speech recognition technology have long been characterized as holding unrealized promise to provide access to...
Roeland Ordelman, Franciska de Jong, Martha Larson
MHCI
2009
Springer
15 years 11 months ago
Context-Aware Mobile Media and Social Networks
Context-awareness is one of the rising trends of future mobile technology, and due to advances in technology development, new application and service concepts are being developed ...
Jonna Häkkilä, Albrecht Schmidt, Jani M&...