Sciweavers

4418 search results - page 70 / 884
» A Formal Approach to Computer Systems Requirements Documenta...
Sort
View
ESORICS
2008
Springer
15 years 5 months ago
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Abstract. We propose a novel approach for quantifying a system's resistance to unknown-message side-channel attacks. The approach is based on a measure of the secret informati...
Michael Backes, Boris Köpf
CLEF
2011
Springer
14 years 4 months ago
External Plagiarism Detection using Information Retrieval and Sequence Alignment - Notebook for PAN at CLEF 2011
Abstract This paper describes the University of Sheffield entry for the 3rd International Competition on Plagiarism Detection which attempted the monolingual external plagiarism d...
Rao Muhammad Adeel Nawab, Mark Stevenson, Paul D. ...
ICPADS
2008
IEEE
15 years 10 months ago
Bootstrapping in Peer-to-Peer Systems
Peer-to-Peer systems have become a substantial element in computer networking. Distributing the load and splitting complex tasks are only some reasons why many developers have com...
Mirko Knoll, Arno Wacker, Gregor Schiele, Torben W...
TREC
2000
15 years 5 months ago
A Semantic Approach to Question Answering Systems
This paper describes the architecture, operation and results obtained with the Question Answering prototype developed in the Department of Language Processing and Information Syst...
José Luis Vicedo González, Antonio F...
RE
2010
Springer
14 years 10 months ago
A goal-based framework for contextual requirements modeling and analysis
Abstract Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerg...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini