Sciweavers

3451 search results - page 616 / 691
» Collaborative attack modeling
Sort
View
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
14 years 5 days ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
ICRE
1998
IEEE
14 years 2 days ago
Surfacing Root Requirements Interactions from Inquiry Cycle Requirements Documents
Systems requirements errors are numerous, persistent, and expensive. To detect such errors, and focus on critical ones during the development of a requirements document, we have d...
William N. Robinson, Suzanne D. Pawlowski
WETICE
1998
IEEE
14 years 2 days ago
Workgroup Middleware for Distributed Projects*
We have developed a middleware framework for workgroup environments that can support distributed software development and a variety of other application domains requiring document...
Gail E. Kaiser, Stephen E. Dossick
RTCSA
1997
IEEE
14 years 1 days ago
A distributed multimedia toolbox
Emphasis of our research lies on the application of realtime multimedia technology: tele-teaching. teleconferencing arid collaborative work. To support this research we need a rea...
Hans Scholten, Pierre G. Jansen
DNIS
2007
Springer
132views Database» more  DNIS 2007»
13 years 11 months ago
LEASE: An Economic Approach to Leasing Data Items in Mobile-P2P Networks to Improve Data Availability
Abstract. This work proposes LEASE, a novel Mobile-P2P lease-based economic incentive model, in which data requestors need to pay the price (in virtual currency) of their requested...
Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsur...