Sciweavers

918 search results - page 87 / 184
» e-Procurement Using Goal Programming
Sort
View
SPW
2005
Springer
14 years 2 months ago
Countering Automated Exploits with System Security CAPTCHAS
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Au...
UM
2001
Springer
14 years 1 months ago
Utility-Based Decision Tree Optimization: A Framework for Adaptive Interviewing
Abstract: An emerging practice in e-commerce systems is to conduct interviews with buyers in order to identify their needs. The goal of such an interview is to determine sets of pr...
Markus Stolze, Michael Ströbel
POPL
2000
ACM
14 years 1 months ago
Transforming Out Timing Leaks
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that want...
Johan Agat
CSEE
2000
Springer
14 years 1 months ago
Lessons Learned from Teaching Software Engineering to Adult Students
Teaching provides many challenges. Presenting Software Engineering to students brings a teacher face to face with a most unwieldy subject. Packaging this subject for delivery to a...
James J. Cusick
DATE
2004
IEEE
117views Hardware» more  DATE 2004»
14 years 15 days ago
Modeling and Validating Globally Asynchronous Design in Synchronous Frameworks
We lay a foundation for modeling and validation of asynchronous designs in a multi-clock synchronous programming model. This allows us to study properties of globally asynchronous...
Mohammad Reza Mousavi, Paul Le Guernic, Jean-Pierr...