Sciweavers

1519 search results - page 174 / 304
» What do they think
Sort
View
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
14 years 5 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....
SEMWEB
2007
Springer
14 years 4 months ago
Ontology Mapping - a User Survey
Ontology mapping is the key to data interoperability in the semantic web vision. Computing mappings is the first step to applications such as query rewriting, instance sharing, we...
Sean M. Falconer, Natalya Fridman Noy, Margaret-An...
ATAL
2005
Springer
14 years 4 months ago
Trust evaluation through relationship analysis
Current mechanisms for evaluating the trustworthiness of an agent within an electronic marketplace depend either on using a history of interactions or on recommendations from othe...
Ronald Ashri, Sarvapali D. Ramchurn, Jordi Sabater...
NSPW
2004
ACM
14 years 4 months ago
Towards agile security assurance
Agile development methodologies are gaining acceptance in the software industry. If they are to be used for constructing securitycritical solutions, what do we do about assurance?...
Konstantin Beznosov, Philippe Kruchten
RE
2004
Springer
14 years 4 months ago
Goal-Oriented Requirements Animation
Requirements engineers need to make sure that the requirements models and specifications they are building do accurately capture what stakeholders really want. Requirements animat...
Hung Tran Van, Axel van Lamsweerde, Philippe Masso...