Sciweavers

ITNG
2008
IEEE
14 years 5 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
ITNG
2008
IEEE
14 years 5 months ago
A Framework for Agent-Based Trust Management in Online Auctions
Current electronic commerce applications such as online auction systems are not trustworthy due to a lack of effective trust management mechanisms. A trustworthy online auction sy...
Haiping Xu, Sol M. Shatz, Christopher K. Bates
ITNG
2008
IEEE
14 years 5 months ago
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
Joshua J. Pauli, Patrick Henry Engebretson
ITNG
2008
IEEE
14 years 5 months ago
On the Properties of System-Wide Responsive Behavior
High contention of flows is associated with unstable network behavior and unmanageable resource administration, i.e., convergence to equilibrium becomes a difficult task. In this ...
Ageliki Tsioliaridou, Vassilis Tsaoussidis
ITNG
2008
IEEE
14 years 5 months ago
Combinatorial Test Case Selection with Markovian Usage Models
A method of using Markov chain techniques for combinatorial test case selection is presented. The method can be used for statistical and coverage testing of many software programs...
Sergiy A. Vilkomir, W. Thomas Swain, Jesse H. Poor...
ITNG
2008
IEEE
14 years 5 months ago
Structural Features for Recognizing Degraded Printed Gurmukhi Script
The performance of an OCR system depends upon printing quality of the input document. Many OCRs have been designed which correctly identify fine printed documents in Indian and ot...
Manish Kumar Jindal, Rajendra Kumar Sharma, Gurpre...
ITNG
2008
IEEE
14 years 5 months ago
Implementing and Validating an Environmental and Health Monitoring System
In this paper the authors describe the implementation and validation of a prototype of an environmental and health monitoring system based on a Wireless Sensor Network (WSN). The ...
Marco Messina, Yen Yang Lim, Elaine Lawrence, Don ...
ITNG
2008
IEEE
14 years 5 months ago
Computer Aided Detection of Suspicious Masses and Micro-Calcifications
Madasu Hanmandlu, Davuluri Vineel, Vamsi Krishna M...
ITNG
2008
IEEE
14 years 5 months ago
Scalable Video Transmission for a Surveillance System
The Area of Interest (AoI) is a distributed scalable video transmission subsystem, for a surveillance system, which concentrates on decrementing the amount of video information tr...
Tomi Räty, Lassi Lehikoinen, François ...
ITNG
2008
IEEE
14 years 5 months ago
Chord-Based Key Establishment Schemes for Sensor Networks
— Because of limited resources at sensor nodes, sensor networks typically adopt symmetric-key algorithms to provide security functions such as protecting communications between n...
Fan Zhang, Zhijie Jerry Shi, Bing Wang