Sciweavers

1466 search results - page 105 / 294
» Completeness of the Authentication Tests
Sort
View
CAINE
2004
13 years 9 months ago
Automated Error-Prevention and Error-Detection Tools for Assembly Language
- Automated tools for error prevention and error detection exist for many high-level languages, but have been nonexistent for assembly-language programs, embedded programs in parti...
Lance G. Johnson, David C. Pheanis
ERCIMDL
2010
Springer
150views Education» more  ERCIMDL 2010»
13 years 9 months ago
A Search Log-Based Approach to Evaluation
Abstract. Anyone offering content in a digital library is naturally interested in assessing its performance: how well does my system meet the users' information needs? Standar...
Junte Zhang, Jaap Kamps
CSREAESA
2010
13 years 6 months ago
The First Clock Cycle Is A Real BIST
The primary goal of Built-In Self-Test (BIST) for Field Programmable Gate Arrays (FPGAs) is to completely test all programmable logic and routing resources in the device such that ...
Charles E. Stroud, Bradley F. Dutton
CHI
2010
ACM
14 years 3 months ago
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Alain Forget, Sonia Chiasson, Robert Biddle
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 2 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...