Sciweavers

641 search results - page 89 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
BCS
2008
13 years 10 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
IAAI
1993
13 years 10 months ago
Dodger, a Diagnostic Expert System for the Evaluation of Nondestructive Test Data
Identification and characterization of indications in eddy current (ET) signals can be highly subjective in nature, with varying diagnoses made by different analysts or by a singl...
Arthur J. Levy, Jane E. Oppenlander, David M. Brud...
TSMC
2010
13 years 3 months ago
Toward Unconstrained Ear Recognition From Two-Dimensional Images
Abstract--Ear recognition, as a biometric, has several advantages. In particular, ears can be measured remotely and are also relatively static in size and structure for each indivi...
John D. Bustard, Mark S. Nixon
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
14 years 19 days ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
SIGIR
2012
ACM
11 years 11 months ago
Search, interrupted: understanding and predicting search task continuation
Many important search tasks require multiple search sessions to complete. Tasks such as travel planning, large purchases, or job searches can span hours, days, or even weeks. Inev...
Eugene Agichtein, Ryen W. White, Susan T. Dumais, ...