Sciweavers

902 search results - page 38 / 181
» Opening Address
Sort
View
ACSAC
2010
IEEE
13 years 6 months ago
Forenscope: a framework for live forensics
Current post-mortem cyber-forensic techniques may cause significant disruption to the evidence gathering process by breaking active network connections and unmounting encrypted di...
Ellick Chan, Shivaram Venkataraman, Francis M. Dav...
USS
2010
13 years 6 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
HCI
2007
13 years 10 months ago
Designing for Participation in Socio-technical Software Systems
Participative software systems are a new class of software systems whose development does not end at the deployment but requires continued user participation and contribution. They...
Yunwen Ye, Gerhard Fischer
IQ
2001
13 years 10 months ago
Managing Information Quality in Virtual Communities of Practice
This paper examines why the rise of computermediated communication, driven by dramatically lowered cost, creates new structural problems from an information quality standpoint. We...
Andreas Neus
DEXA
2000
Springer
127views Database» more  DEXA 2000»
14 years 1 months ago
From Object-Oriented to Aspect-Oriented Databases
Over the recent years aspect-oriented programming (AOP) has found increasing interest among researchers in software engineering. Aspects are ions which capture and localise cross-c...
Awais Rashid, Elke Pulvermüller