Sciweavers

399 search results - page 53 / 80
» A computational and analysis tool for proteomics research
Sort
View
FMICS
2009
Springer
14 years 3 months ago
Towards an Industrial Use of FLUCTUAT on Safety-Critical Avionics Software
Most modern safety-critical control programs, such as those embedded in fly-by-wire control systems, perform a lot of floating-point computations. The well-known pitfalls of IEEE...
David Delmas, Eric Goubault, Sylvie Putot, Jean So...
ACMDIS
2006
ACM
14 years 2 months ago
What do usability evaluators do in practice?: an explorative study of think-aloud testing
Think-aloud testing is a widely employed usability evaluation method, yet its use in practice is rarely studied. We report an explorative study of 14 think-aloud sessions, the aud...
Mie Nørgaard, Kasper Hornbæk
AVI
2004
13 years 10 months ago
Display space usage and window management operation comparisons between single monitor and multiple monitor users
The continuing trend toward greater processing power, larger storage, and in particular increased display surface by using multiple monitor supports increased multi-tasking by the...
Dugald Ralph Hutchings, Greg Smith, Brian Meyers, ...
GD
2008
Springer
13 years 10 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
IEEEIAS
2009
IEEE
14 years 3 months ago
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression
: Threats to information security for healthcare information system increased tremendously. There are various factors that contribute to information security threats, many research...
Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilw...