Sciweavers

JSW
2008
127views more  JSW 2008»
13 years 10 months ago
A Trust Based System for Enhanced Spam Filtering
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing ...
Jimmy McGibney, Dmitri Botvich
JSW
2008
163views more  JSW 2008»
13 years 10 months ago
Model-Driven User Requirements Specification using SysML
Requirements engineering is an important phase in a system's life cycle. When poorly performed, various problems may occur, such as failures, cost overrun and delays. The incr...
Michel dos Santos Soares, Jos L. M. Vrancken
JSW
2008
73views more  JSW 2008»
13 years 10 months ago
Teaching Virtual Experts for Multi-Domain Collaborative Planning
Abstract-- This paper presents an approach to rapid development of virtual planning experts that can collaborate to develop plans of action requiring expertise from multiple domain...
Gheorghe Tecuci, Mihai Boicu, Dorin Marcu, Marcel ...
JSW
2008
89views more  JSW 2008»
13 years 10 months ago
Secure Set Union and Bag Union Computation for Guaranteeing Anonymity of Distrustful Participants
Abstract-- The computation of the union operator for different distributed datasets involves two challenges when participants are curious and can even act malicious: guaranteeing a...
Stefan Böttcher, Sebastian Obermeier
JSW
2008
101views more  JSW 2008»
13 years 10 months ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz
JSW
2008
105views more  JSW 2008»
13 years 10 months ago
Representing Procedural Logic in XML
Extensible Markup Language (XML) is a powerful tool used for describing structured documents and exchanging standardized data files over the Internet. This article describes how us...
Albert D. Bethke
JSW
2008
101views more  JSW 2008»
13 years 10 months ago
Broadcast Authentication with Practically Unbounded One-way Chains
A protocol for assuring the authenticity of information broadcasted over long periods of time is proposed. The protocol is based on time synchronization and uses one-way chains con...
Bogdan Groza
JSW
2008
95views more  JSW 2008»
13 years 10 months ago
Quality-of-Context and its use for Protecting Privacy in Context Aware Systems
Context-awareness refers to systems that unobtrusively adapt to the environment of their users on the basis of context information, popularly known as contextaware systems. One inh...
Kamran Sheikh, Maarten Wegdam, Marten van Sinderen
JSW
2008
122views more  JSW 2008»
13 years 10 months ago
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...
Tieyan Li, Guilin Wang, Robert H. Deng
JSW
2008
202views more  JSW 2008»
13 years 10 months ago
Change Prediction in Object-Oriented Software Systems: A Probabilistic Approach
An estimation of change-proneness of parts of a software system is an active topic in the area of software engineering. Such estimates can be used to predict changes to different c...
Ali R. Sharafat, Ladan Tahvildari