Sciweavers

263 search results - page 25 / 53
» Reports and Surveys
Sort
View
91
Voted
ISESE
2005
IEEE
15 years 6 months ago
Risk analysis terminology for IT-systems: does it match intuition?
Many risk specific concepts like “threat”, “consequence” and “risk” belong to the daily language. In a risk analysis one cannot be certain that the participants’ int...
Ida Hogganvik, Ketil Stølen
122
Voted
DEXA
2011
Springer
263views Database» more  DEXA 2011»
14 years 8 days ago
Sampling the National Deep Web
A huge portion of today’s Web consists of web pages filled with information from myriads of online databases. This part of the Web, known as the deep Web, is to date relatively ...
Denis Shestakov
SIGIR
2010
ACM
14 years 11 months ago
Search system requirements of patent analysts
Patent search tasks are difficult and challenging, often requiring expert patent analysts to spend hours, even days, sourcing relevant information. To aid them in this process, an...
Leif Azzopardi, Wim Vanderbauwhede, Hideo Joho
88
Voted
ACE
2004
200views Education» more  ACE 2004»
15 years 1 months ago
Static Analysis of Students' Java Programs
A recent industry survey (Townhidnejad and Hilburn, 2002) has reported that more than fifty percent of a software project's budget is spent on activities related to improving...
Nghi Truong, Paul Roe, Peter Bancroft
89
Voted
IEEEIAS
2009
IEEE
15 years 7 months ago
Detecting Insider Attacks Using Non-negative Matrix Factorization
—It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicate...
Jan Platos, Václav Snásel, Pavel Kr&...