Sciweavers

2421 search results - page 388 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ICSE
2007
IEEE-ACM
14 years 10 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...
ICRA
2009
IEEE
166views Robotics» more  ICRA 2009»
14 years 4 months ago
Anatomically correct testbed hand control: Muscle and joint control strategies
— Human hands are capable of many dexterous grasping and manipulation tasks. To understand human levels of dexterity and to achieve it with robotic hands, we constructed an anato...
Ashish Deshpande, Jonathan Ko, Dieter Fox, Yoky Ma...
SIGIR
2009
ACM
14 years 4 months ago
Has adhoc retrieval improved since 1994?
Evaluation forums such as TREC allow systematic measurement and comparison of information retrieval techniques. The goal is consistent improvement, based on reliable comparison of...
Timothy G. Armstrong, Alistair Moffat, William Web...
ACSAC
2008
IEEE
14 years 4 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
ICALT
2008
IEEE
14 years 4 months ago
NUCLEO: Adaptive Computer Supported Collaborative Learning in a Role Game Based Scenario
This paper presents the adaptation model used in NUCLEO, a pilot e-learning environment that is currently being developed at the Complutense University of Madrid. The NUCLEO syste...
Pilar Sancho, Rubén Fuentes-Fernánde...