Sciweavers

3193 search results - page 532 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
VIP
2001
13 years 11 months ago
Avatars: A Shifting Interaction
The intersection of theatre-performance, design, and informatics is a fertile area for a broader understanding of the possible design and interaction between people and avatars in...
Kristine Deray
HOTOS
2003
IEEE
14 years 3 months ago
Palimpsest: Soft-Capacity Storage for Planetary-Scale Services
Distributed writable storage systems typically provide NFS-like semantics and unbounded persistence for files. We claim that for planetary-scale distributed services such facilit...
Timothy Roscoe, Steven Hand
CDC
2009
IEEE
261views Control Systems» more  CDC 2009»
14 years 3 months ago
Stability and stabilization of a class of ill-conditioned second order differential linear repetitive processes
: This paper considers differential linear repetitive processes which are a distinct class of 2D systems whose dynamics evolve over a subset of the upper right quadrant of the 2D p...
Pawel Grzegorz Dabkowski, Krzysztof Galkowski, Eri...
TAP
2008
Springer
94views Hardware» more  TAP 2008»
13 years 10 months ago
Vacuity in Testing
Abstract. In recent years, we see a growing awareness to the importance of assessing the quality of specifications. In the context of model checking, this can be done by analyzing ...
Thomas Ball, Orna Kupferman
WCRE
1999
IEEE
14 years 2 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...