Sciweavers

262 search results - page 41 / 53
» Arkose: reusing informal information from online discussions
Sort
View
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 5 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
CIKM
2005
Springer
14 years 1 months ago
Feature-based recommendation system
The explosive growth of the world-wide-web and the emergence of e-commerce has led to the development of recommender systems—a personalized information filtering technology use...
Eui-Hong Han, George Karypis
ICSM
1997
IEEE
13 years 11 months ago
MORALE. Mission ORiented Architectural Legacy Evolution
Software evolution is the most costly and time consuming software development activity. Yet software engineering research is predominantly concerned with initial development. MORA...
Gregory D. Abowd, Ashok K. Goel, Dean F. Jerding, ...
LREC
2010
168views Education» more  LREC 2010»
13 years 9 months ago
Formal Description of Resources for Ontology-based Semantic Annotation
Ontology-based semantic annotation aims at putting fragments of a text in correspondence with proper elements of an ontology such that the formal semantics encoded by the ontology...
Yue Ma, Adeline Nazarenko, Laurent Audibert
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 7 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...