Sciweavers

575 search results - page 33 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
EUROSYS
2008
ACM
14 years 4 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
SIGMETRICS
2000
ACM
101views Hardware» more  SIGMETRICS 2000»
14 years 1 days ago
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs
We consider an architecture for a serverless distributed file system that does not assume mutual trust among the client computers. The system provides security, availability, and ...
William J. Bolosky, John R. Douceur, David Ely, Ma...
CHI
1998
ACM
13 years 12 months ago
Cognitive Function Analysis for Human-Centered Automation of Safety-Critical Systems
The Cognitive Function Analysis is a methodology supportedby a mediating tool for the human-centered automationof safety-critical systems[4]. It is basedon a socio-cognitive model...
Guy A. Boy
SAC
2008
ACM
13 years 7 months ago
ECG data provisioning for telehomecare monitoring
The latest computer and communication technologies in combination with an enhanced ECG analysis system can be used to improve cardiac patient's follow-up out-of-hospital. In ...
Bernardo Gonçalves, José Gonç...
WOSP
1998
ACM
13 years 12 months ago
Poems: end-to-end performance design of large parallel adaptive computational systems
The POEMS project is creating an environment for end-to-end performance modeling of complex parallel and distributed systems, spanning the domains of application software, runti...
Ewa Deelman, Aditya Dube, Adolfy Hoisie, Yong Luo,...