Sciweavers

1239 search results - page 202 / 248
» Generating Web Applications from Use Case Scenarios
Sort
View
116
Voted
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 10 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
124
Voted
CHI
2010
ACM
15 years 3 months ago
Designing with mobile digital storytelling in rural Africa
We reflect on activities to design a mobile application to enable rural people in South Africa's Eastern Cape to record and share their stories, which have implications for `...
Nicola J. Bidwell, Thomas Reitmaier, Gary Marsden,...
128
Voted
FORTE
2008
15 years 5 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
173
Voted
TSMC
2011
228views more  TSMC 2011»
14 years 10 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...
KES
2007
Springer
15 years 3 months ago
KeyGraph-based chance discovery for mobile contents management system
Chance discovery provides a way to find rare but very important events for future decision making. It can be applied to stock market prediction, earthquake alarm, intrusion detect...
Kyung-Joong Kim, Myung-Chul Jung, Sung-Bae Cho