Sciweavers

260 search results - page 38 / 52
» Risk and Requirements-Based Testing
Sort
View
ACSAC
2005
IEEE
15 years 5 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
ACNS
2005
Springer
93views Cryptology» more  ACNS 2005»
15 years 5 months ago
Messin' with Texas Deriving Mother's Maiden Names Using Public Records
We have developed techniques to automatically infer mother's maiden names from public records. We demonstrate our techniques using publicly available records from the state o...
Virgil Griffith, Markus Jakobsson
IDA
2005
Springer
15 years 5 months ago
Learning Label Preferences: Ranking Error Versus Position Error
We consider the problem of learning a ranking function, that is a mapping from instances to rankings over a finite number of labels. Our learning method, referred to as ranking by...
Eyke Hüllermeier, Johannes Fürnkranz
WINE
2005
Springer
109views Economy» more  WINE 2005»
15 years 5 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy
ICCBR
2005
Springer
15 years 5 months ago
Autonomous Internal Control System for Small to Medium Firms
Small to medium enterprises require an internal control mechanism in order to monitor their modus operandi and to analyse whether they are achieving their goals. A tool for the dec...
María Lourdes Borrajo Diz, Juan M. Corchado...