Sciweavers

1466 search results - page 91 / 294
» Completeness of the Authentication Tests
Sort
View
SAT
2009
Springer
126views Hardware» more  SAT 2009»
14 years 2 months ago
Extending SAT Solvers to Cryptographic Problems
Cryptography ensures the confidentiality and authenticity of information but often relies on unproven assumptions. SAT solvers are a powerful tool to test the hardness of certain ...
Mate Soos, Karsten Nohl, Claude Castelluccia
DIGRA
2005
Springer
14 years 1 months ago
Learning Games as a Platform for Simulated Science Practice
In recent years, science education has been the focus of study and development of new gamebased learning environments. It has been argued that active and critical learning about r...
Rikke Magnussen
SIGUCCS
2000
ACM
13 years 11 months ago
Windows 2000 Deployment Technical Challenges at the University of Colorado at Boulder
Microsoft Windows 2000 represents a major change in desktop and network operating systems. This latest Windows operating system includes many new features and technologies that wi...
Brad Judy, Alfred Roberts, David Bodnar
ICPR
2010
IEEE
13 years 11 months ago
How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values?
In the biometric verification, authentication is given when a distance of biometric signatures between enrollment and test phases is less than an acceptance threshold, and the perf...
Yasushi Makihara, Md. Altab Hossain, Yasushi Yagi
FTCS
1998
144views more  FTCS 1998»
13 years 9 months ago
Improving Software Robustness with Dependability Cases
Programs fail mainly for two reasons: logic errors in the code, and exception failures. Exception failures can account for up to 2/3 of system crashes [6], hence are worthy of ser...
Roy A. Maxion, Robert T. Olszewski