Sciweavers

3024 search results - page 520 / 605
» Requirement Engineering in Service-Oriented System Engineeri...
Sort
View
DSN
2009
IEEE
15 years 11 months ago
Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor
Dynamic Information Flow Tracking (DIFT) is a promising security technique. With hardware support, DIFT prevents a wide range of attacks on vulnerable software with minimal perfor...
Hari Kannan, Michael Dalton, Christos Kozyrakis
EUROMICRO
2009
IEEE
15 years 11 months ago
Exercise Generation by Group Models for Autonomous Web-Based Learning
Abstract— Creating exercises for learners requires significant time. This is one reason, beside difficulties of discussing individualized tasks in a classroom setting, why often ...
Michael Sonntag
SP
2009
IEEE
130views Security Privacy» more  SP 2009»
15 years 11 months ago
Wirelessly Pickpocketing a Mifare Classic Card
The Mifare Classic is the most widely used contactless smartcard on the market. The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious atta...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...
AIED
2009
Springer
15 years 11 months ago
Looking Into Collaborative Learning: Design from Macro- and Micro-Script Perspectives
Design of collaborative learning (CL) scenarios is a complex task, but necessary if the goal of the collaboration is learning. Creating well-thought-out CL scenarios requires exper...
Eloy D. Villasclaras-Fernández, Seiji Isota...
CIKM
2009
Springer
15 years 11 months ago
Translating relevance scores to probabilities for contextual advertising
Information retrieval systems conventionally assess document relevance using the bag of words model. Consequently, relevance scores of documents retrieved for different queries a...
Deepak Agarwal, Evgeniy Gabrilovich, Robert Hall, ...