Sciweavers

10066 search results - page 60 / 2014
» A Technique for Information System Integration
Sort
View
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
13 years 10 months ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...
CRIWG
2007
13 years 9 months ago
Alternative Dispute Resolution Based on the Storytelling Technique
Abstract. This paper describes a groupware prototype addressing the alternative resolution of legal conflicts. The groupware prototype integrates the storytelling and argumentation...
Pedro Antunes, Sara Relvas, Marcos R. S. Borges
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
13 years 11 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
AVI
1998
13 years 9 months ago
Design method of interaction techniques for large information spaces
Our work focuses on the design of interaction techniques for large information spaces. Our goal is not to define yet another visualization technique but to provide insights for th...
Laurence Nigay, Frédéric Vernier
ICSE
2005
IEEE-ACM
14 years 7 months ago
An empirical evaluation of test case filtering techniques based on exercising complex information flows
Some software defects trigger failures only when certain complex information flows occur within the software. Profiling and analyzing such flows therefore provides a potentially i...
David Leon, Wes Masri, Andy Podgurski