Sciweavers

4917 search results - page 479 / 984
» Software Engineering is Not Computer Science
Sort
View
EDBTW
2010
Springer
15 years 11 months ago
A method for evaluating marketer re-identification risk
Disclosures of health databases for secondary purposes is increasing rapidly. In this paper, we develop and evaluate a reidentification risk metric for the case where an intruder ...
Fida Kamal Dankar, Khaled El Emam
CISIS
2009
IEEE
15 years 11 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
CISIS
2009
IEEE
15 years 11 months ago
Vision-Based 3D Fingertip Interface for Spatial Interaction in 3D Integral Imaging System
In this paper, we propose a novel interactive integral imaging system using vision-based 3D fingertip interface. This system consists of the real 3D image generation system based ...
Nam Woo Kim, Dong-Hak Shin, Dong-Jin Kim, Byung-Go...
TASE
2009
IEEE
15 years 11 months ago
Fault-Based Test Case Generation for Component Connectors
The complex interactions appearing in service-oriented computing make coordination a key concern in serviceoriented systems. In this paper, we present a fault-based method to gene...
Bernhard K. Aichernig, Farhad Arbab, Lacramioara A...
ICSEA
2009
IEEE
15 years 11 months ago
Rule-Based Service Modeling
— In the context of service-oriented computing, services provide the capabilities necessary to support the business, especially its processes. Within the service modeling process...
Michael Gebhart, Sebastian Abeck