Sciweavers

1629 search results - page 172 / 326
» A Study of Malcode-Bearing Documents
Sort
View
108
Voted
WPES
2004
ACM
15 years 9 months ago
Specifying privacy policies with P3P and EPAL: lessons learned
As computing becomes more ubiquitous and Internet use continues to rise, it is increasingly important for organizations to construct accurate and effective privacy policies that d...
William H. Stufflebeam, Annie I. Antón, Qin...
118
Voted
ATAL
2004
Springer
15 years 9 months ago
QueryTracker: An Agent for Tracking Persistent Information Needs
Most people have long term information interests. Current Web search engines satisfy immediate information needs. Specific sites support tracking of long term interests. We prese...
Gabriel Somlo, Adele E. Howe
136
Voted
JSSPP
2004
Springer
15 years 8 months ago
Are User Runtime Estimates Inherently Inaccurate?
Computer system batch schedulers typically require information from the user upon job submission, including a runtime estimate. Inaccuracy of these runtime estimates, relative to ...
Cynthia Bailey Lee, Yael Schwartzman, Jennifer Har...
112
Voted
RE
2004
Springer
15 years 8 months ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
115
Voted
ICEIS
2003
IEEE
15 years 8 months ago
An XML View of the "World"
Abstract: The paper presents ”Any Input XML Output” (AIXO), a general and flexible software architecture for wrappers. The architecture has been designed to present data sourc...
Ezio Bartocci, Emanuela Merelli, Leonardo Mariani