Sciweavers

289 search results - page 35 / 58
» Provenance: a future history
Sort
View
IPPS
2007
IEEE
14 years 4 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
FSTTCS
2007
Springer
14 years 4 months ago
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
Abstract. The abstraction of cryptographic operations by term algebras, called DolevYao models or symbolic cryptography, is essential in almost all tool-supported methods for provi...
Michael Backes, Markus Dürmuth, Ralf Küs...
WEBI
2005
Springer
14 years 3 months ago
Adding the Temporal Dimension to Search - A Case Study in Publication Search
The most well known search techniques are perhaps the PageRank and HITS algorithms. In this paper we argue that these algorithms miss an important dimension, the temporal dimensio...
Philip S. Yu, Xin Li, Bing Liu
CHI
2010
ACM
14 years 3 months ago
Early explorations of CAT: canine amusement and training
Cross-species computer applications have a history of blended science and humor, despite the real potential for improving the canine-human bond. New activities available to humans...
Chadwick A. Wingrave, Jeremy Rose, Todd Langston, ...
DEXAW
2003
IEEE
168views Database» more  DEXAW 2003»
14 years 3 months ago
Visualisation of (Distributed) Process Execution based on Extended BPMN
In order to create, share and improve knowledge on business processes, humans need a common, readable and preferably visual notation. So far, a lot of effort has been put into vis...
Mariusz Momotko, Bartosz Nowicki