Sciweavers

3066 search results - page 485 / 614
» On Facilitating Automated Evaluation
Sort
View
CSFW
2007
IEEE
14 years 2 months ago
Privacy and Utility in Business Processes
se an abstract model of business processes for the purpose of (i) evaluating privacy policy in light of the goals of the process and (ii) developing automated support for privacy ...
Adam Barth, John C. Mitchell, Anupam Datta, Sharad...
DSN
2007
IEEE
14 years 2 months ago
Robustness and Security Hardening of COTS Software Libraries
COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and s...
Martin Süßkraut, Christof Fetzer
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
14 years 2 months ago
e-Government in Transition Countries: Prospects and Challenges
The implementation of e-government is a challenging task in any developed political context, but all the more uniquely so in the post-communist transitioning countries. These coun...
Mysore Ramaswamy, Audrey N. Selian
ICC
2007
IEEE
14 years 2 months ago
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes
— In this paper, we propose an endpoint-based joint network-host anomaly detection technique to detect selfpropagating malicious codes. Our proposed technique is based on the obs...
Syed A. Khayam, Hayder Radha
ICDAR
2007
IEEE
14 years 2 months ago
Automatic Extraction of Data from 2-D Plots in Documents
Two-dimensional (2-D) plots in digital documents contain important information. Often, the results of scientific experiments and performance of businesses are summarized using pl...
Xiaonan Lu, James Ze Wang, Prasenjit Mitra, C. Lee...