Sciweavers

405 search results - page 75 / 81
» Avatar-centric Risk Evaluation
Sort
View
ASAP
2007
IEEE
157views Hardware» more  ASAP 2007»
14 years 1 months ago
Automatic Generation and Optimisation of Reconfigurable Financial Monte-Carlo Simulations
Monte-Carlo simulations are used in many applications, such as option pricing and portfolio evaluation. Due to their high computational load and intrinsic parallelism, they are id...
David B. Thomas, Jacob A. Bower, Wayne Luk
CHI
2007
ACM
14 years 1 months ago
Capturing, sharing, and using local place information
With new technology, people can share information about everyday places they go; the resulting data helps others find and evaluate places. Recent applications like Dodgeball and S...
Pamela J. Ludford, Reid Priedhorsky, Ken Reily, Lo...
SOUPS
2010
ACM
14 years 1 months ago
Do windows users follow the principle of least privilege?: investigating user account control practices
The principle of least privilege requires that users and their programs be granted the most restrictive set of privileges possible to perform required tasks in order to limit the ...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
14 years 1 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
BPM
2006
Springer
153views Business» more  BPM 2006»
14 years 1 months ago
Shop Floor Information Management and SOA
Service Science is a new term for a new paradigm which aims at the solution of an obvious problem: How to make the increasing fusion of business and IT successful in a dynamically ...
Konrad Pfadenhauer, Burkhard Kittl, Schahram Dustd...