Sciweavers

1172 search results - page 180 / 235
» Who killed design
Sort
View
GECCO
2011
Springer
346views Optimization» more  GECCO 2011»
13 years 13 days ago
Evolving relationships between social networks and stakeholder involvement in software projects
Software projects often fail because stakeholder communication and involvement are inadequate. This paper proposes a novel method to understand project social networks and their c...
Soo Ling Lim, Peter J. Bentley
ACMACE
2011
ACM
12 years 9 months ago
WeQuest: scalable alternate reality games through end-user content authoring
Alternate Reality Games (ARGs) are interactive narrative experiences that engage the player by layering a fictional world over the real world. Mobile ARG stories are often geo-sp...
Andrew Macvean, Sanjeet Hajarnis, Brandon Headrick...
ASUNAM
2011
IEEE
12 years 9 months ago
Locating Central Actors in Co-offending Networks
—A co-offending network is a network of offenders who have committed crimes together. Recently different researches have shown that there is a fairly strong concept of network am...
Mohammad A. Tayebi, Laurens Bakker, Uwe Gläss...
CCS
2011
ACM
12 years 9 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
IACR
2011
85views more  IACR 2011»
12 years 8 months ago
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
The hardware-attractive block cipher family KTANTAN was studied by Bogdanov and Rechberger who identified flaws in the key schedule and gave a meet-in-the-middle attack. We revis...
Martin Ågren