Sciweavers

315 search results - page 6 / 63
» Claims Analysis
Sort
View
ACSW
2007
13 years 10 months ago
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model t...
Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Sa...
ECIS
2003
13 years 10 months ago
Towards a language/action theoretic approach to relationship analysis
Relationship analysis aims at supporting the eliciting and documenting of potential relationship structures of an application domain by providing analysts with a systematic techni...
Fahri Yetim, Michael P. Bieber
BIOSYSTEMS
2008
111views more  BIOSYSTEMS 2008»
13 years 8 months ago
Autonomy and hypersets
This paper has two primary aims. The first is to provide an introductory discussion of hyperset theory and its usefulness for modeling complex systems. The second aim is a hyperset...
Anthony Chemero, Michael T. Turvey
SIGDOC
2003
ACM
14 years 1 months ago
Liability for defective documentation
Several companies are careless about the accuracy of their user manuals and online help, leading readers to believe that a product has characteristics that it lacks. Under America...
Cem Kaner
AAAI
2004
13 years 10 months ago
Evaluating Ontology Cleaning
Ontology as a discipline of Computer Science has made many claims about its usefulness, however to date there has been very little evaluation of those claims. We present the resul...
Christopher A. Welty, Ruchi Mahindru, Jennifer Chu...