Sciweavers

318 search results - page 58 / 64
» Evaluation of Natural Language Requirements in the MODCONTRO...
Sort
View
CCS
2005
ACM
14 years 1 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
TKDE
2010
284views more  TKDE 2010»
13 years 5 months ago
Unsupervised Semantic Similarity Computation between Terms Using Web Documents
Abstract— In this work, web-based metrics for semantic similarity computation between words or terms are presented and compared with the state-of-the-art. Starting from the funda...
Elias Iosif, Alexandros Potamianos
PRESENCE
2000
127views more  PRESENCE 2000»
13 years 7 months ago
Interactions in Perceived Quality of Auditory-Visual Displays
The quality of realism in virtual environments (VEs) is typically considered to be a function of visual and audio fidelity mutually exclusive of each other. However, the VE partic...
Russell L. Storms, Michael Zyda
ICEBE
2007
IEEE
174views Business» more  ICEBE 2007»
14 years 1 months ago
Worksheet-Driven UMM Modeling of B2B Services
In the development process of a B2B system it is crucial that the business experts are able to express and evaluate agreements and commitments between the partners and that the so...
Christian Huemer, Marco Zapletal, Philipp Liegl, R...
ATAL
2005
Springer
14 years 1 months ago
Multi-agent decision support via user-modeling
Decision-support requires the gathering and presentation of information, but is subject to many kinds of resource restrictions (e.g. cost, length, time). Individual users differ n...
Terrence Harvey, Keith S. Decker, Sandra Carberry