Sciweavers

3066 search results - page 434 / 614
» On Facilitating Automated Evaluation
Sort
View
SAC
2010
ACM
14 years 3 months ago
Ontology-based generation of IT-security metrics
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Stefan Fenz
ACHI
2009
IEEE
14 years 3 months ago
Ground Truth Verification Tool (GTVT) for Video Surveillance Systems
— As cameras and storage devices have become cheaper, the number of video surveillance systems has also increased. Video surveillance was (and mostly is) done by human operators ...
Amol Ambardekar, Mircea Nicolescu, Sergiu Dascalu
SP
2009
IEEE
143views Security Privacy» more  SP 2009»
14 years 2 months ago
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
—This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how mo...
Bart Coppens, Ingrid Verbauwhede, Koen De Bosscher...
KBSE
2009
IEEE
14 years 2 months ago
Automatically Recommending Triage Decisions for Pragmatic Reuse Tasks
—Planning a complex software modification task imposes a high cognitive burden on developers, who must juggle navigating the software, understanding what they see with respect t...
Reid Holmes, Tristan Ratchford, Martin P. Robillar...
IEEESCC
2009
IEEE
14 years 2 months ago
Cost-Effective Semantic Annotation of XML Schemas and Web Service Interfaces
—Research in the field of semantic Web services aims at automating the discovery, selection, composition and management of Web services based on semantic descriptions. However, t...
Peep Küngas, Marlon Dumas