Sciweavers

495 search results - page 57 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
P2P
2006
IEEE
229views Communications» more  P2P 2006»
14 years 3 months ago
Cost-Aware Processing of Similarity Queries in Structured Overlays
Large-scale distributed data management with P2P systems requires the existence of similarity operators for queries as we cannot assume that all users will agree on exactly the sa...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...
PKDD
2007
Springer
102views Data Mining» more  PKDD 2007»
14 years 3 months ago
Towards Data Mining Without Information on Knowledge Structure
Most knowledge discovery processes are biased since some part of the knowledge structure must be given before extraction. We propose a framework that avoids this bias by supporting...
Alexandre Vautier, Marie-Odile Cordier, Rene Quini...
UKCBR
1995
14 years 1 months ago
Self-Questioning and Experimentation: An Index Vocabulary of Situated Interaction
Various cognitive and computational models have addressed the use of previous experience to understand a new domain. In particular, research in case-based reasoning has explored t...
Rüdiger Oehlmann, Peter Edwards, Derek H. Sle...
HCSE
2010
13 years 7 months ago
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats end...
Shamal Faily, Ivan Flechais
DEBS
2008
ACM
13 years 11 months ago
Distributed automatic service composition in large-scale systems
Automatic service composition is an active research area in the field of service computing. This paper presents a distributed approach to automatically discover a composition of s...
Songlin Hu, Vinod Muthusamy, Guoli Li, Hans-Arno J...