Sciweavers

575 search results - page 40 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
COLING
2010
13 years 2 months ago
Benchmarking for syntax-based sentential inference
We propose a methodology for investigating how well NLP systems handle meaning preserving syntactic variations. We start by presenting a method for the semi automated creation of ...
Paul Bédaride, Claire Gardent
UML
2001
Springer
14 years 4 days ago
An Axiomatic Formalization of UML Models
: Though it is widely recognized that object-oriented methodologies are most effective in developing large scale software, it is still dif cult to apply high level computer support...
Toshiaki Aoki, Takaaki Tateishi, Takuya Katayama
CHI
2011
ACM
12 years 11 months ago
Comparing activity theory with distributed cognition for video analysis: beyond "kicking the tires"
The field of HCI is growing, not only in the variety of application areas or the volume of research conducted, but also in the number of analytical approaches for use in the evalu...
Eric P. S. Baumer, Bill Tomlinson
PERCOM
2006
ACM
14 years 7 months ago
Cantag: an open source software toolkit for designing and deploying marker-based vision systems
This paper presents Cantag, an open source software toolkit for building Marker-based Vision (MBV) systems that can identify and accurately locate printed markers in three dimensi...
Andrew C. Rice, Alastair R. Beresford, Robert K. H...