Sciweavers

1356 search results - page 37 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
SAC
2004
ACM
14 years 1 months ago
Information requirements engineering for data warehouse systems
Information requirements analysis for data warehouse systems differs significantly from requirements analysis for conventional information systems. Based on interviews with projec...
Robert Winter, Bernhard Strauch
BMCBI
2006
129views more  BMCBI 2006»
13 years 8 months ago
EGenBio: A Data Management System for Evolutionary Genomics and Biodiversity
Background: Evolutionary genomics requires management and filtering of large numbers of diverse genomic sequences for accurate analysis and inference on evolutionary processes of ...
Laila A. Nahum, Matthew T. Reynolds, Zhengyuan O. ...
ESEM
2010
ACM
13 years 7 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
SOUPS
2005
ACM
14 years 2 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
CCS
2011
ACM
12 years 8 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...