Sciweavers

180
Voted
AISM
2004
15 years 1 months ago
PKI - Advantages and Obstacles
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
A. Jancic, Matthew J. Warren
147
Voted
UIALL
2004
Springer
15 years 5 months ago
Using Automatic Tools in Accessibility and Usability Assurance Processes
Abstract. The paper claims that processes for monitoring, assessing and ensuring appropriate levels of accessibility and usability have to be adopted by web development and mainten...
Giorgio Brajnik
SSWMC
2004
15 years 1 months ago
Attacks on biometric systems: a case study in fingerprints
In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks t...
Umut Uludag, Anil K. Jain
136
Voted
TRUSTBUS
2004
Springer
15 years 5 months ago
Privacy Preserving Data Generation for Database Application Performance Testing
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
Yongge Wang, Xintao Wu, Yuliang Zheng
134
Voted
OOPSLA
2004
Springer
15 years 5 months ago
Chianti: a tool for change impact analysis of java programs
This paper reports on the design and implementation of Chianti, a change impact analysis tool for Java that is implemented in the context of the Eclipse environment. Chianti analy...
Xiaoxia Ren, Fenil Shah, Frank Tip, Barbara G. Ryd...
Security Privacy
Top of PageReset Settings