Sciweavers

15783 search results - page 3098 / 3157
» Evidence-Based Software Engineering
Sort
View
ISORC
2007
IEEE
14 years 3 months ago
A Comparative Evaluation of EJB Implementation Methods
As E-businesses are becoming ubiquitous, enhancing the performance and scalability of ebusiness systems has become an increasingly important topic of investigation. As Vitruvius (...
Andreas Stylianou, Giovanna Ferrari, Paul D. Ezhil...
SECON
2007
IEEE
14 years 3 months ago
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Abstract—While mechanisms exist to instantiate common security functionality such as confidentiality and integrity, little has been done to define a mechanism for identificati...
Damon McCoy, Douglas C. Sicker, Dirk Grunwald
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
14 years 3 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
AIHC
2007
Springer
14 years 3 months ago
Affect Detection and an Automated Improvisational AI Actor in E-Drama
Enabling machines to understand emotions and feelings of the human users in their natural language textual input during interaction is a challenging issue in Human Computing. Our w...
Li Zhang, Marco Gillies, John A. Barnden, Robert J...
CCS
2007
ACM
14 years 3 months ago
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
« Prev « First page 3098 / 3157 Last » Next »