Sciweavers

263 search results - page 25 / 53
» Reports and Surveys
Sort
View
ISESE
2005
IEEE
14 years 4 months ago
Risk analysis terminology for IT-systems: does it match intuition?
Many risk specific concepts like “threat”, “consequence” and “risk” belong to the daily language. In a risk analysis one cannot be certain that the participants’ int...
Ida Hogganvik, Ketil Stølen
DEXA
2011
Springer
263views Database» more  DEXA 2011»
12 years 10 months ago
Sampling the National Deep Web
A huge portion of today’s Web consists of web pages filled with information from myriads of online databases. This part of the Web, known as the deep Web, is to date relatively ...
Denis Shestakov
SIGIR
2010
ACM
13 years 9 months ago
Search system requirements of patent analysts
Patent search tasks are difficult and challenging, often requiring expert patent analysts to spend hours, even days, sourcing relevant information. To aid them in this process, an...
Leif Azzopardi, Wim Vanderbauwhede, Hideo Joho
ACE
2004
200views Education» more  ACE 2004»
14 years 10 days ago
Static Analysis of Students' Java Programs
A recent industry survey (Townhidnejad and Hilburn, 2002) has reported that more than fifty percent of a software project's budget is spent on activities related to improving...
Nghi Truong, Paul Roe, Peter Bancroft
IEEEIAS
2009
IEEE
14 years 5 months ago
Detecting Insider Attacks Using Non-negative Matrix Factorization
—It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicate...
Jan Platos, Václav Snásel, Pavel Kr&...