Sciweavers

597 search results - page 98 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
ISSRE
2005
IEEE
14 years 1 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
14 years 25 days ago
Locational Pricing and Scheduling for an Integrated Energy-Reserve Market
It is well known that given a network that can become constrained on voltage or real power flows, reserves must also be spatially located in order to handle all credible contingen...
Jie Chen, James S. Thorp, Robert J. Thomas, Timoth...
FECS
2006
103views Education» more  FECS 2006»
13 years 9 months ago
TMAS A Capstone Project
The College of Engineering and Computer Science at the University of Tennessee at Chattanooga (UTC) requires all undergraduate seniors to participate in a capstone project designe...
Joseph M. Kizza, Li Yang, Andy Novobilski, Kathy W...
ISORC
2006
IEEE
14 years 1 months ago
RTSTREAM: Real-Time Query Processing for Data Streams
Many real-time applications, such as traffic control systems, surveillance systems and health monitoring systems, need to operate on continuous unbounded streams of data. These ap...
Yuan Wei, Sang Hyuk Son, John A. Stankovic
AAAI
2008
13 years 10 months ago
Mining Translations of Web Queries from Web Click-through Data
Query translation for Cross-Lingual Information Retrieval (CLIR) has gained increasing attention in the research area. Previous work mainly used machine translation systems, bilin...
Rong Hu, Weizhu Chen, Jian Hu, Yansheng Lu, Zheng ...