Sciweavers

3193 search results - page 545 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
INFOVIS
1999
IEEE
14 years 2 months ago
Visualizing Application Behavior on Superscalar Processors
The advent of superscalar processors with out-of-order execution makes it increasingly difficult to determine how well an application is utilizing the processor and how to adapt t...
Chris Stolte, Robert Bosch, Pat Hanrahan, Mendel R...
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 10 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
IPPS
2008
IEEE
14 years 4 months ago
Translational research design templates, Grid computing, and HPC
Design templates that involve discovery, analysis, and integration of information resources commonly occur in many scientific research projects. In this paper we present examples o...
Joel H. Saltz, Scott Oster, Shannon Hastings, Step...
HICSS
2007
IEEE
195views Biometrics» more  HICSS 2007»
14 years 4 months ago
Digital Relationships in the "MySpace" Generation: Results From a Qualitative Study
A qualitative study was conducted to explore how subjects use social networking sites and instant messenger to engage in interpersonal relationships. The results were used to deve...
Catherine Dwyer
ISWC
2003
IEEE
14 years 3 months ago
Unsupervised, Dynamic Identification of Physiological and Activity Context in Wearable Computing
Context-aware computing describes the situation where a wearable / mobile computer is aware of its user’s state and surroundings and modifies its behavior based on this informat...
Andreas Krause, Daniel P. Siewiorek, Asim Smailagi...