Sciweavers

1629 search results - page 172 / 326
» A Study of Malcode-Bearing Documents
Sort
View
WPES
2004
ACM
14 years 2 months ago
Specifying privacy policies with P3P and EPAL: lessons learned
As computing becomes more ubiquitous and Internet use continues to rise, it is increasingly important for organizations to construct accurate and effective privacy policies that d...
William H. Stufflebeam, Annie I. Antón, Qin...
ATAL
2004
Springer
14 years 2 months ago
QueryTracker: An Agent for Tracking Persistent Information Needs
Most people have long term information interests. Current Web search engines satisfy immediate information needs. Specific sites support tracking of long term interests. We prese...
Gabriel Somlo, Adele E. Howe
JSSPP
2004
Springer
14 years 2 months ago
Are User Runtime Estimates Inherently Inaccurate?
Computer system batch schedulers typically require information from the user upon job submission, including a runtime estimate. Inaccuracy of these runtime estimates, relative to ...
Cynthia Bailey Lee, Yael Schwartzman, Jennifer Har...
RE
2004
Springer
14 years 2 months ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
ICEIS
2003
IEEE
14 years 2 months ago
An XML View of the "World"
Abstract: The paper presents ”Any Input XML Output” (AIXO), a general and flexible software architecture for wrappers. The architecture has been designed to present data sourc...
Ezio Bartocci, Emanuela Merelli, Leonardo Mariani