Sciweavers

550 search results - page 71 / 110
» Supporting plan authoring and analysis
Sort
View
KBSE
2007
IEEE
14 years 2 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
MTSR
2007
Springer
14 years 1 months ago
The Human Art of Encoding: Markup as Documentary Practice
This paper describes the Markup Analysis Project, a research initiative of the Information Policy and Practice Research Group at the University of Sydney to investigate frameworks ...
Paul Scifleet, Susan P. Williams, Creagh Cole
DOCENG
2005
ACM
13 years 9 months ago
Towards active web clients
Recent developments of document technologies have strongly impacted the evolution of Web clients over the last fifteen years, but all Web clients have not taken the same advantag...
Vincent Quint, Irène Vatton
CSCW
2012
ACM
12 years 3 months ago
Integrating local and remote worlds through channel blending
Recent advances in ubiquitous technology have greatly changed the way people stay connected. We conducted an in-depth video shadowing study to observe how close-knit groups use al...
Ellen Isaacs, Margaret H. Szymanski, Yutaka Yamauc...
VLDB
2005
ACM
109views Database» more  VLDB 2005»
14 years 8 months ago
Model-based approximate querying in sensor networks
Abstract Declarative queries are proving to be an attractive paradigm for interacting with networks of wireless sensors. The metaphor that "the sensornet is a database" i...
Amol Deshpande, Carlos Guestrin, Samuel Madden, Jo...