Sciweavers

9071 search results - page 1814 / 1815
» A co-design modeling approach for computer network systems
Sort
View
JCDL
2006
ACM
151views Education» more  JCDL 2006»
14 years 24 days ago
Tagging of name records for genealogical data browsing
In this paper we present a method of parsing unstructured textual records briefly describing a person and their direct relatives, which we use in the construction of a browsing t...
Mike Perrow, David Barber
ISSRE
2003
IEEE
14 years 3 days ago
Reducing wasted development time via continuous testing
Testing is often performed frequently during development to ensure software reliability by catching regression errors quickly. However, stopping frequently to test also wastes tim...
David Saff, Michael D. Ernst
IFIP12
2004
13 years 8 months ago
An Agency for Semantic-Based Automatic Discovery of Web Services
With the evolution of Web service technology, services will not only become increasingly sophisticated, but also move into the area of business-to-consumer and peer-to-peer interac...
Simona Colucci, Tommaso Di Noia, Eugenio Di Sciasc...
JAR
2000
145views more  JAR 2000»
13 years 6 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 4 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
« Prev « First page 1814 / 1815 Last » Next »