Sciweavers

1809 search results - page 265 / 362
» Using GDE in Educational Systems
Sort
View
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 4 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
CORR
2010
Springer
157views Education» more  CORR 2010»
15 years 4 months ago
Detecting Coordination Problems in Collaborative Software Development Environments
Software development is rarely an individual effort and generally involves teams of developers collaborating to generate good reliable code. Among the software code there exist te...
Chintan Amrit, Jos van Hillegersberg
CORR
2010
Springer
113views Education» more  CORR 2010»
15 years 4 months ago
Exposing Application Components as Web Services
This paper explores technology permitting arbitrary application components to be exposed for remote access from other software. Using this, the application and its constituent com...
Scott M. Walker, Alan Dearle, Graham N. C. Kirby, ...
CORR
2010
Springer
131views Education» more  CORR 2010»
15 years 4 months ago
Multimode Control Attacks on Elections
In 1992, Bartholdi, Tovey, and Trick [1992] opened the study of control attacks on elections--attempts to improve the election outcome by such actions as adding/deleting candidate...
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hem...
CORR
2010
Springer
128views Education» more  CORR 2010»
15 years 4 months ago
Random Oracles in a Quantum World
Once quantum computers reach maturity most of today's traditional cryptographic schemes based on RSA or discrete logarithms become vulnerable to quantum-based attacks. Hence, ...
Özgür Dagdelen, Marc Fischlin, Anja Lehm...