Sciweavers

1425 search results - page 212 / 285
» The combined ISAC-ER methodology of information systems deve...
Sort
View
WSE
2006
IEEE
15 years 3 months ago
Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...
WWW
2009
ACM
15 years 10 months ago
Deriving music theme annotations from user tags
Music theme annotations would be really beneficial for supporting retrieval, but are often neglected by users while annotating. Thus, in order to support users in tagging and to f...
Kerstin Bischoff, Claudiu S. Firan, Raluca Paiu
INFOVIS
2003
IEEE
15 years 3 months ago
Visualization of Large-Scale Customer Satisfaction Surveys Using a Parallel Coordinate Tree
Satisfaction surveys are an important measurement tool in fields such as market research or human resources management. Serious studies consist of numerous questions and contain a...
Dominique Brodbeck, Luc Girardin
CHIMIT
2008
ACM
14 years 11 months ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
ICCBR
1999
Springer
15 years 2 months ago
Surfing the Digital Wave
In the future digital TV will offer an unprecedented level of programme choice. We are told that this will lead to dramatic increases in viewer satisfaction as all viewing tastes a...
Barry Smyth, Paul Cotter