Sciweavers

2429 search results - page 212 / 486
» Using Aspects to Design a Secure System
Sort
View
104
Voted
AAAI
1997
15 years 4 months ago
Statistical Parsing with a Context-Free Grammar and Word Statistics
We describe a parsing system based upon a language model for English that is, in turn, based upon assigning probabilities to possible parses for a sentence. This model is used in ...
Eugene Charniak
142
Voted
ICSE
2005
IEEE-ACM
16 years 3 months ago
Use of relative code churn measures to predict system defect density
Software systems evolve over time due to changes in requirements, optimization of code, fixes for security and reliability bugs etc. Code churn, which measures the changes made to...
Nachiappan Nagappan, Thomas Ball
136
Voted
MM
2006
ACM
157views Multimedia» more  MM 2006»
15 years 9 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
127
Voted
IPPS
2007
IEEE
15 years 9 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
188
Voted
ASIACRYPT
2006
Springer
15 years 5 months ago
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
We introduce a primitive called Hierarchical Identity-Coupling Broadcast Encryption (HICBE) that can be used for constructing efficient collusion-resistant public-key broadcast enc...
Nuttapong Attrapadung, Jun Furukawa, Hideki Imai