Sciweavers

2455 search results - page 83 / 491
» Graphical abstract help
Sort
View
JSAI
2005
Springer
14 years 2 months ago
Exploration of Researchers' Social Network for Discovering Communities
Abstract. The research community plays a very important role in helping researchers undertake new research topics. The authors propose a community mining system that helps to find...
Ryutaro Ichise, Hideaki Takeda, Kosuke Ueyama
DAGSTUHL
2003
13 years 10 months ago
On Feature Orientation and on Requirements Encapsulation Using Families of Requirements
Abstract. Naive feature orientation runs into problems with large software systems, such as telephone switching systems. With naive feature orientation, a feature extends a base sy...
Jan Bredereke
FC
2007
Springer
111views Cryptology» more  FC 2007»
14 years 3 months ago
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks
Abstract. In this usability study of phishing attacks and browser antiphishing defenses, 27 users each classified 12 web sites as fraudulent or legitimate. By dividing these users...
Collin Jackson, Daniel R. Simon, Desney S. Tan, Ad...
FMCAD
2007
Springer
14 years 3 months ago
Automated Extraction of Inductive Invariants to Aid Model Checking
Abstract— Model checking can be aided by inductive invariants, small local properties that can be proved by simple induction. We present a way to automatically extract inductive ...
Michael L. Case, Alan Mishchenko, Robert K. Brayto...
ICSE
2012
IEEE-ACM
11 years 11 months ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...