Sciweavers

3657 search results - page 37 / 732
» A Study of Practical Deduplication
Sort
View
SP
2009
IEEE
143views Security Privacy» more  SP 2009»
14 years 4 months ago
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
—This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how mo...
Bart Coppens, Ingrid Verbauwhede, Koen De Bosscher...
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
14 years 4 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke
ACMDIS
2006
ACM
14 years 4 months ago
Storyboarding: an empirical determination of best practices and effective guidelines
Storyboarding is a common technique in HCI and design for demonstrating system interfaces and contexts of use. Despite its recognized benefits, novice designers still encounter ch...
Khai N. Truong, Gillian R. Hayes, Gregory D. Abowd
COMPSAC
2002
IEEE
14 years 3 months ago
WWM: A Practical Methodology for Web Application Modeling
Web applications are becoming more complex and the way to manage that complexity is to model them. This paper presents a methodology to model Web applications directly from the ob...
Chanwit Kaewkasi, Wanchai Rivepiboon
IADIS
2003
13 years 11 months ago
A Web Site Decision Chart: Practice vs Theory
The authors introduce a decision chart previously developed to identify web site features that would be suitable for small businesses in their interactions with customers. The dec...
Stephen Burgess, Stan Karanasios, Geoffrey Sandy