Sciweavers

224 search results - page 26 / 45
» A General Methodology For The Development Of An Effective In...
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
The Good, the Bad, And the Ugly: Stepping on the Security Scale
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Mary Ann Davidson
COMCOM
2006
111views more  COMCOM 2006»
13 years 7 months ago
SCON: Secure management of continuity in sensor networks
Due to limited energy capacity of batteries, the function lifetime of sensor networks in general is longer than the operational lifetime of single nodes. Therefore, to keep the ne...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri
SOUPS
2009
ACM
14 years 2 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
CIKM
2007
Springer
14 years 2 months ago
Ontology evaluation using wikipedia categories for browsing
Ontology evaluation is a maturing discipline with methodologies and measures being developed and proposed. However, evaluation methods that have been proposed have not been applie...
Jonathan Yu, James A. Thom, Audrey M. Tam
3DPVT
2004
IEEE
159views Visualization» more  3DPVT 2004»
13 years 11 months ago
Blind Watermarking of 3D Shapes using Localized Constraints
This paper develops a digital watermarking methodology for 3-D graphical objects defined by polygonal meshes. In watermarking or fingerprinting the aim is to embed a code in a giv...
Adrian G. Bors