Sciweavers

575 search results - page 78 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
TC
2010
13 years 2 months ago
Model-Driven System Capacity Planning under Workload Burstiness
In this paper, we define and study a new class of capacity planning models called MAP queueing networks. MAP queueing networks provide the first analytical methodology to describe ...
Giuliano Casale, Ningfang Mi, Evgenia Smirni
ICPR
2002
IEEE
14 years 8 months ago
Structure in Errors: A Case Study in Fingerprint Verification
Measuring the accuracy of biometrics systems is important. Accuracy estimates depend very much on the quality of the test data that are used. Including poor quality data will degr...
Sharath Pankanti, Nalini K. Ratha, Ruud M. Bolle
ETRA
2010
ACM
221views Biometrics» more  ETRA 2010»
14 years 2 months ago
Advanced gaze visualizations for three-dimensional virtual environments
Gaze visualizations represent an effective way for gaining fast insights into eye tracking data. Current approaches do not adequately support eye tracking studies for three-dimens...
Sophie Stellmach, Lennart Nacke, Raimund Dachselt
SAC
2009
ACM
14 years 11 days ago
Towards "WYDIWYS" for MIMI using concept analysis
This paper presents a novel software engineering approach for developing a dynamic web interface that meets the quality criterion of “WYDIWYS” - What You Do Is What You See. T...
Jie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang ...
EUROSYS
2008
ACM
14 years 4 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...