Sciweavers

3104 search results - page 562 / 621
» Competence-Based EE-Learning: (How) Can We Implement It
Sort
View
136
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
ICSM
2009
IEEE
15 years 11 months ago
What's hot and what's not: Windowed developer topic analysis
As development on a software project progresses, developers shift their focus between different topics and tasks many times. Managers and newcomer developers often seek ways of un...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
127
Voted
CIKM
2009
Springer
15 years 11 months ago
Structure-aware indexing for keyword search in databases
Most of existing methods of keyword search over relational databases find the Steiner trees composed of relevant tuples as the answers. They identify the Steiner trees by discove...
Guoliang Li, Jianhua Feng, Jianyong Wang
SASO
2008
IEEE
15 years 11 months ago
Integer Gradient for Cellular Automata: Principle and Examples
—When programming a spatial computing medium such as a cellular automaton, the hop count distance to some set of sources (particles) is an often used information. In particular, ...
Luidnel Maignan, Frédéric Gruau
150
Voted
FC
2007
Springer
158views Cryptology» more  FC 2007»
15 years 10 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou