Sciweavers

10021 search results - page 1789 / 2005
» Adaptive information extraction
Sort
View
HASE
2008
IEEE
13 years 11 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
IWCMC
2010
ACM
13 years 11 months ago
Policy-driven workflows for mobile network management automation
Future wireless networks will experience a continuous growth regarding the number of network elements with increasingly complex interrelations between the configuration of multipl...
Raphael Romeikat, Bernhard Bauer, Tobias Bandh, Ge...
MM
2010
ACM
157views Multimedia» more  MM 2010»
13 years 11 months ago
Interactive storytelling via video content recombination
In the paper we present a prototype of video-based storytelling that is able to generate multiple story variants from a baseline video. The video content for the system is generat...
Julie Porteous, Sergio Benini, Luca Canini, Fred C...
CCS
2010
ACM
13 years 11 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster
SIGCOMM
2010
ACM
13 years 11 months ago
Efficient error estimating coding: feasibility and applications
Motivated by recent emerging systems that can leverage partially correct packets in wireless networks, this paper investigates the novel concept of error estimating codes (EEC). W...
Binbin Chen, Ziling Zhou, Yuda Zhao, Haifeng Yu
« Prev « First page 1789 / 2005 Last » Next »