Sciweavers

2846 search results - page 534 / 570
» Not one click for security
Sort
View
TELSYS
2008
85views more  TELSYS 2008»
15 years 4 months ago
Trustworthy Web services provisioning for differentiated customer services
With the number of e-Business applications dramatically increasing, a service level agreement (SLA) will play an important part in Web services. The SLA is a combination of severa...
Kaiqi Xiong, Harry G. Perros
TSE
2008
148views more  TSE 2008»
15 years 4 months ago
Benchmarking Classification Models for Software Defect Prediction: A Proposed Framework and Novel Findings
Software defect prediction strives to improve software quality and testing efficiency by constructing predictive classification models from code attributes to enable a timely ident...
Stefan Lessmann, Bart Baesens, Christophe Mues, Sw...
JAR
2000
145views more  JAR 2000»
15 years 3 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
NETWORK
2008
233views more  NETWORK 2008»
15 years 3 months ago
WhozThat? evolving an ecosystem for context-aware mobile social networks
One of the most compelling social questions, which until now was left unanswered by current technology, is "Who's that?" This question is usually asked about a new ...
Aaron Beach, Mike Gartrell, Sirisha Akkala, Jack E...
CORR
2008
Springer
119views Education» more  CORR 2008»
15 years 2 months ago
Unified storage systems for distributed Tier-2 centres
The start of data taking at the Large Hadron Collider will herald a new era in data volumes and distributed processing in particle physics. Data volumes of hundreds of Terabytes wi...
Greig A. Cowan, Graeme A. Stewart, Andrew Elwell