Sciweavers

491 search results - page 82 / 99
» RETNA: From Requirements to Testing in a Natural Way
Sort
View
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 1 months ago
Detecting SPIT Calls by Checking Human Communication Patterns
— SPam over Internet Telephony (SPIT) is expected to become a very serious issue in the next years. The threat is going to spin out from the well known email spam problem by bot ...
Jürgen Quittek, Saverio Niccolini, Sandra Tar...
SIGADA
2004
Springer
14 years 23 days ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
SIGMOD
2005
ACM
154views Database» more  SIGMOD 2005»
14 years 7 months ago
Lazy XML Updates: Laziness as a Virtue of Update and Structural Join Efficiency
XML documents are normally stored as plain text files. Hence, the natural and most convenient way to update XML documents is to simply edit the text files. But efficient query eva...
Barbara Catania, Wen Qiang Wang, Beng Chin Ooi, Xi...
KDD
2003
ACM
130views Data Mining» more  KDD 2003»
14 years 7 months ago
Towards systematic design of distance functions for data mining applications
Distance function computation is a key subtask in many data mining algorithms and applications. The most effective form of the distance function can only be expressed in the conte...
Charu C. Aggarwal
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott