Sciweavers

1746 search results - page 132 / 350
» Residual for Component Specifications
Sort
View
WWW
2009
ACM
16 years 5 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
CSEE
2007
Springer
15 years 10 months ago
Creating Meaningful Assessments for Professional Development Education in Software Architecture
Extensive instructional materials have been developed and used for courses in specific software architecture topics offered at the Software Engineering Institute (SEI) at Carnegie...
Elspeth Golden, Len Bass
WOWMOM
2006
ACM
162views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
Gauging VoIP Call Quality from 802.11 WLAN Resource Usage
In this paper we experimentally study the relationship between resource utilization in the wireless LAN and the quality of VoIP calls transmitted over the wireless medium. Specifi...
Miroslaw Narbutt, Mark Davis
ACSAC
1999
IEEE
15 years 8 months ago
Tools to Support Secure Enterprise Computing
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...
CLADE
2004
IEEE
15 years 8 months ago
Engineering a Peer-to-Peer Collaboratory for Tissue Microarray Research
This paper presents the design, development and evaluation of a prototype peer-to-peer collaboratory for imaging, analyzing, and seamlessly sharing tissue microarrays (TMA), corre...
Cristina Schmidt, Manish Parashar, Wenjin Chen, Da...