Sciweavers

19003 search results - page 222 / 3801
» We Need Assurance!
Sort
View
ISI
2008
Springer
13 years 10 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
CHI
2003
ACM
14 years 11 months ago
Persona development for information-rich domains
Designing information architecture for complex websites requires understanding user information needs and mental models in that domain. Personas, or user archetypes, created for s...
Rashmi R. Sinha
ICMCS
2007
IEEE
125views Multimedia» more  ICMCS 2007»
14 years 5 months ago
JPEG Based Conditional Entropy Coding for Correlated Steganography
Correlated steganography considers the case in which the cover Work is chosen to be correlated with the covert message that is to be hidden. The advantage of this is that, at leas...
Lei Zheng, Ingemar J. Cox
MSR
2005
ACM
14 years 4 months ago
A framework for describing and understanding mining tools in software development
We propose a framework for describing, comparing and understanding tools for the mining of software repositories. The fundamental premise of this framework is that mining should b...
Daniel M. Germán, Davor Cubranic, Margaret-...
SSS
2005
Springer
14 years 4 months ago
A Snap-Stabilizing DFS with a Lower Space Requirement
Abstract. A snap-stabilizing protocol, starting from any arbitrary initial configuration, always behaves according to its specification. In [4], we presented the first snap-stab...
Alain Cournier, Stéphane Devismes, Vincent ...