Sciweavers

3193 search results - page 564 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
ICDM
2008
IEEE
113views Data Mining» more  ICDM 2008»
14 years 3 months ago
Online Reliability Estimates for Individual Predictions in Data Streams
Several predictive systems are nowadays vital for operations and decision support. The quality of these systems is most of the time defined by their average accuracy which has lo...
Pedro Pereira Rodrigues, João Gama, Zoran B...
DRM
2007
Springer
14 years 3 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
SAC
2010
ACM
14 years 3 months ago
A business driven cloud optimization architecture
In this paper, we discuss several facets of optimization in cloud computing, the corresponding challenges and propose an architecture for addressing those challenges. We consider ...
Marin Litoiu, C. Murray Woodside, Johnny Wong, Joa...
IUI
2004
ACM
14 years 2 months ago
Usability trade-offs for adaptive user interfaces: ease of use and learnability
An analysis of context-aware user interfaces shows that adaptation mechanisms have a cost-benefit trade-off for usability. Unpredictable autonomous interface adaptations can easil...
Tim F. Paymans, Jasper Lindenberg, Mark A. Neerinc...
CHI
2004
ACM
14 years 9 months ago
Breaking the book: translating the chemistry lab book into a pervasive computing lab environment
The UK e-Science programme is relying on the evolution of the paper lab book into a pervasive data gathering lab system. To date take up of existing commercial or research lab boo...
Monica M. C. Schraefel, Gareth V. Hughes, Hugo R. ...