Sciweavers

806 search results - page 92 / 162
» A Practitioners
Sort
View
VALUETOOLS
2006
ACM
166views Hardware» more  VALUETOOLS 2006»
14 years 4 months ago
Fairness considerations of scheduling in multi-server and multi-queue systems
— Multi-server and multi-queue architectures are common mechanisms used in a large variety of applications (call centers, Web services, computer systems). One of the major motiva...
David Raz, Benjamin Avi-Itzhak, Hanoch Levy
WIKIS
2006
ACM
14 years 4 months ago
Wikis of locality: insights from the open guides
In this paper we describe an emerging form of wikis - wikis of locality – that support physical rather than virtual communities. We draw on our experience as administrators of t...
Mark Gaved, Tom Heath, Marc Eisenstadt
ACSAC
2005
IEEE
14 years 4 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
ACSAC
2005
IEEE
14 years 4 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
ASWEC
2005
IEEE
14 years 4 months ago
Australian Software Development: What Software Project Management Practices Lead to Success?
We surveyed a number of Australian software practitioners in order to understand what software development practices were used in their recent software projects. We were particula...
June M. Verner, Narciso Cerpa