Sciweavers

1477 search results - page 289 / 296
» What's the point of documentation
Sort
View
CCS
2007
ACM
14 years 2 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
CLEF
2007
Springer
14 years 2 months ago
University and Hospitals of Geneva Participating at ImageCLEF 2007
This article describes the participation of the University and Hospitals of Geneva at three tasks of the 2007 ImageCLEF image retrieval benchmark. The visual retrieval techniques r...
Xin Zhou, Julien Gobeill, Patrick Ruch, Henning M&...
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 2 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
WECWIS
2006
IEEE
151views ECommerce» more  WECWIS 2006»
14 years 1 months ago
Registering UMM Business Collaboration Models in an ebXML Registry
UN/CEFACT’s modeling methodology (UMM) is used to develop global choreographies of inter-organizational business processes. UMM models should be publically available in order to...
Birgit Hofreiter, Christian Huemer, Marco Zapletal
ISSTA
2006
ACM
14 years 1 months ago
Towards supporting the architecture design process through evaluation of design alternatives
This paper addresses issues involved when an architect explore alternative designs including non-functional requirements; in our approach, non-functional requirements are expresse...
Lihua Xu, Scott A. Hendrickson, Eric Hettwer, Hada...