Sciweavers

341 search results - page 46 / 69
» A Security Engineering Process based on Patterns
Sort
View
ICMI
2009
Springer
164views Biometrics» more  ICMI 2009»
15 years 9 months ago
GaZIR: gaze-based zooming interface for image retrieval
We introduce GaZIR, a gaze-based interface for browsing and searching for images. The system computes on-line predictions of relevance of images based on implicit feedback, and wh...
László Kozma, Arto Klami, Samuel Kas...
COMPSAC
2010
IEEE
15 years 14 days ago
Behavior Monitoring in Self-Healing Service-Oriented Systems
Web services and service-oriented architecture (SOA) have become the de facto standard for designing distributed and loosely coupled applications. Many servicebased applications de...
Harald Psaier, Florian Skopik, Daniel Schall, Scha...
ICSE
2008
IEEE-ACM
16 years 3 months ago
Symbolic mining of temporal specifications
Program specifications are important in many phases of the software development process, but they are often omitted or incomplete. An important class of specifications takes the f...
Mark Gabel, Zhendong Su
EUROSYS
2006
ACM
15 years 11 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
IJNSEC
2007
119views more  IJNSEC 2007»
15 years 2 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...