Sciweavers

641 search results - page 98 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
SIGSOFT
2003
ACM
14 years 9 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
PDP
2007
IEEE
14 years 3 months ago
A High-Level Reference Model for Reusable Object-Level Coordination Support in Groupware Applications
The success of groupware software largely depends on its capability for being reused in different collaborative scenarios without requiring significant software development effort...
Miguel A. Gomez-Hernandez, Juan I. Asensio-P&eacut...
CCS
2006
ACM
14 years 14 days ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
BMCBI
2007
107views more  BMCBI 2007»
13 years 8 months ago
Linking microarray reporters with protein functions
Background: The analysis of microarray experiments requires accurate and up-to-date functional annotation of the microarray reporters to optimize the interpretation of the biologi...
Stan Gaj, Arie van Erk, Rachel I. M. van Haaften, ...
ICIP
2008
IEEE
14 years 10 months ago
Significant jet point for facial image representation and recognition
Gabor wavelet related feature extraction and classification is an important topic in image analysis and pattern recognition. Gabor features can be used either holistically or anal...
Sanqiang Zhao, Yongsheng Gao