Sciweavers

3193 search results - page 550 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
AVI
2010
13 years 11 months ago
3D attentional maps: aggregated gaze visualizations in three-dimensional virtual environments
Gaze visualizations hold the potential to facilitate usability studies of interactive systems. However, visual gaze analysis in threedimensional virtual environments still lacks m...
Sophie Stellmach, Lennart Nacke, Raimund Dachselt
BIBE
2008
IEEE
160views Bioinformatics» more  BIBE 2008»
14 years 4 months ago
Parallel integration of heterogeneous genome-wide data sources
— Heterogeneous genome-wide data sources capture information on various aspects of complex biological systems. For instance, transcriptome, interactome and phenome-level informat...
Derek Greene, Kenneth Bryan, Padraig Cunningham
SRDS
2010
IEEE
13 years 8 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
RTSS
2008
IEEE
14 years 4 months ago
A Multi-mode Real-Time Calculus
The Real-Time Calculus (RTC) framework proposed in [Chakraborty et al., DATE 2003] and subsequently extended in [Wandeler et al., Real-Time Systems 29(2-3), 2005] and a number of ...
Linh T. X. Phan, Samarjit Chakraborty, P. S. Thiag...
HICSS
2003
IEEE
117views Biometrics» more  HICSS 2003»
14 years 3 months ago
The German Mobile Standards Battle
The diffusion of innovations has long been a research domain in IS research. Yet, there is no sound theory nor practice to fully understand the complex mechanisms behind networks ...
Roman Beck, Daniel Beimborn, Tim Weitzel