Sciweavers

16 search results - page 3 / 4
» Keynote Address
Sort
View
LRE
2007
87views more  LRE 2007»
13 years 7 months ago
Unleashing the killer corpus: experiences in creating the multi-everything AMI Meeting Corpus
The AMI Meeting Corpus contains 100 hours of meetings captured using many synchronized recording devices, and is designed to support work in speech and video processing, language ...
Jean Carletta
TISSEC
2002
82views more  TISSEC 2002»
13 years 7 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
IFIP
1989
Springer
13 years 11 months ago
Industrial Strength Software Development Environments
‘‘Industrial strength’’ software development environments (SDEs) must provide facilities to address three essential properties of multi-developer software systems: evoluti...
Dewayne E. Perry
ESORICS
2006
Springer
13 years 11 months ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...
SIGSOFT
2012
ACM
12 years 3 months ago
Report from the 2nd international workshop on replication in empirical software engineering research (RESER 2011)
The RESER workshop provides a venue in which empirical software engineering researchers can discuss the theoretical foundations and methods of replication, as well as present the ...
Jonathan L. Krein, Charles D. Knutson, Lutz Preche...