Sciweavers

1347 search results - page 211 / 270
» A Web-based requirements analysis tool
Sort
View
CHI
2009
ACM
14 years 3 months ago
Pathfinder: an online collaboration environment for citizen scientists
For over a century, citizen scientists have volunteered to collect huge quantities of data for professional scientists to analyze. We designed Pathfinder, an online environment th...
Kurt Luther, Scott Counts, Kristin B. Stecher, Aar...
ICSE
2009
IEEE-ACM
14 years 3 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
AIMS
2009
Springer
14 years 3 months ago
Visualization of Node Interaction Dynamics in Network Traces
The analysis of network traces often requires to find the spots where something interesting happens. Since traces are usually very large data-sets, it is often not easy and time i...
Petar Dobrev, Sorin Stancu-Mara, Jürgen Sch&o...
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
14 years 3 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
EICS
2009
ACM
14 years 3 months ago
Interactive usability instrumentation
Usage data logged from user interactions can be extremely valuable for evaluating software usability. However, instrumenting software to collect usage data is a time-intensive tas...
Scott Bateman, Carl Gutwin, Nathaniel Osgood, Gord...