Sciweavers

1629 search results - page 149 / 326
» A Study of Malcode-Bearing Documents
Sort
View
ECIS
2003
13 years 10 months ago
Contemporary issues of enterprise content management: the case of statoil
The concept of Enterprise Content Management (ECM) represents integrated enterprise-wide management of the life cycles of all forms of recorded information content and their metad...
Bjørn Erik Munkvold, Tero Päiväri...
ICDE
2008
IEEE
241views Database» more  ICDE 2008»
14 years 10 months ago
PictureBook: A Text-and-Image Summary System for Web Search Result
Search engine technology plays an important role in Web information retrieval. However, with Internet information explosion, traditional searching techniques cannot provide satisfa...
Baile Shi, Guoyu Hao, Hongtao Xu, Mei Wang, Qi Zha...
WWW
2007
ACM
14 years 10 months ago
XML design for relational storage
Design principles for XML schemas that eliminate redundancies and avoid update anomalies have been studied recently. Several normal forms, generalizing those for relational databa...
Solmaz Kolahi, Leonid Libkin
NDSS
2008
IEEE
14 years 3 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...
ISESE
2006
IEEE
14 years 3 months ago
PBR vs. checklist: a replication in the n-fold inspection context
Inspection is considered a powerful method to check software documents for defects. Many published work shows that inspections in requirements specification phase are particularly...
Lulu He, Jeffrey C. Carver