Sciweavers

3451 search results - page 549 / 691
» Collaborative attack modeling
Sort
View
ESSOS
2009
Springer
14 years 4 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
CIKM
2009
Springer
14 years 3 months ago
Hydra: a hybrid recommender system [cross-linked rating and content information]
This paper discusses the combination of collaborative and contentbased filtering in the context of web-based recommender systems. In particular, we link the well-known MovieLens ...
Stephan Spiegel, Jérôme Kunegis, Fang...
EUROPAR
2009
Springer
14 years 3 months ago
PSINS: An Open Source Event Tracer and Execution Simulator for MPI Applications
The size of supercomputers in numbers of processors is growing exponentially. Today’s largest supercomputers have upwards of a hundred thousand processors and tomorrow’s may ha...
Mustafa M. Tikir, Michael Laurenzano, Laura Carrin...
DSRT
2008
IEEE
14 years 3 months ago
Design of Application-Specific Incentives in P2P Networks
A rational P2P node may decide not to provide a particular resource or to provide it with degraded quality. If nodes are very likely to behave this way, or if the failure of an P2...
Andrew Roczniak, Abdulmotaleb El-Saddik, Ross Kouh...
MODELS
2007
Springer
14 years 3 months ago
Rigorously Defining and Analyzing Medical Processes: An Experience Report
Abstract. This paper describes our experiences in defining the processes associated with preparing and administrating chemotherapy and then using those process definitions as the b...
Stefan Christov, Bin Chen, George S. Avrunin, Lori...