Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Common Weakness Enumeration
Known as:
CWE
Common Weakness Enumeration is a software community project that aims at creating a catalog of software weaknesses and vulnerabilities. The goal of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Common Vulnerabilities and Exposures
Software quality
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Semantic Analysis for Identifying Security Concerns in Software Procurement Edicts
R. N. Peclat
,
G. N. Ramos
New generation computing
2017
Corpus ID: 5786231
Brazilian Federal Institutions must acquire software tools by procurement, so their software teams have to develop, verify, and…
Expand
2017
2017
MISSION AWARE: Evidence-Based, Mission-Centric Cybersecurity Analysis
Georgios Bakirtzis
,
Bryan T. Carter
,
C. Fleming
,
C. Elks
arXiv.org
2017
Corpus ID: 26678280
Currently, perimeter-based approaches are the mainstay of cybersecurity. While this paradigm is necessary, there is mounting…
Expand
2017
2017
A Double Sampling Scheme for Process Mean Monitoring
Su-Fen Yang
,
Sin-Hong Wu
IEEE Access
2017
Corpus ID: 44824139
Mean control charts are effective tools for detecting mean shifts of an interesting quality variable in both manufacturing…
Expand
Review
2011
Review
2011
Supporting Mobile Collaboration in Spatially Distributed Workgroups with Digital Interactive Maps
E. Meyer
,
D. Wichmann
,
Henning Büsch
,
Susanne CJ Boll
Journal on spesial topics in mobile networks and…
2011
Corpus ID: 15016992
Following the mobile computing trend, business logics of distributed, cooperative applications started to move into the mobile…
Expand
2011
2011
Annotation-based access control for collaborative information spaces
P. Nasirifard
,
Vassilios Peristeras
,
S. Decker
Computers in Human Behavior
2011
Corpus ID: 39829437
2009
2009
Quasi 2-D Field Reconstruction Using the Conjoint Cylindrical Wave Expansion
R. Pirkl
,
G. Durgin
IEEE Transactions on Antennas and Propagation
2009
Corpus ID: 37436352
Off-the-horizon propagation severely degrades the accuracy of any field reconstruction technique that presupposes a two…
Expand
Review
2008
Review
2008
Location-Based Mapping Services to Support Collaboration in Spatially Distributed Workgroups
E. Meyer
,
D. Wichmann
,
Henning Büsch
,
Susanne CJ Boll
International Conference on Collaborative…
2008
Corpus ID: 16682744
Mobile devices and systems reached almost every part of our daily life. Following the mobile computing trend, also business…
Expand
2006
2006
The European network of living labs for CWE : user-centric co-creation and innovation
A. Mirijamdotter
,
Anna Ståhlbröst
,
Annika Sällström
,
V. Niitamo
,
Seija Kulkki
2006
Corpus ID: 58755261
In this paper we focus on Living Labs for promoting and developing Collaborative Working Environments (CWE). The issues we…
Expand
2001
2001
E-commerce through wireless devices
Z. Maamar
,
Wathiq Mansoor
,
H. Yahyaoui
Proceedings Tenth IEEE International Workshop on…
2001
Corpus ID: 36299172
This paper presents the E-CWE (E-Commerce through Wireless dEvices) project. This project aims at investigating techniques and…
Expand
1998
1998
Estudo comparativo entre diferentes abordagens educativas no sistema de alojamento conjunto Comparative study of different educational approaches in the rooming-in care system
M. Vitolo
,
Patrícia BaxterJ
,
C. Mori
,
Anna Carolina
,
Bianca Stanziola
,
Ingrid Damaceno Rosa
1998
Corpus ID: 77477430
Thebasic principie oflhe rooming-in care is 10provide complele assislance care and guidance 10 molhers regarding Iheir and Iheir…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE