Sciweavers

1663 search results - page 151 / 333
» Computer Security in the Real World
Sort
View
DSN
2008
IEEE
15 years 10 months ago
WS-DREAM: A distributed reliability assessment Mechanism for Web Services
It is critical to guarantee the reliability of serviceoriented applications. This is because they may employ remote Web Services as components, which may easily become unavailable...
Zibin Zheng, Michael R. Lyu
130
Voted
CIG
2005
IEEE
15 years 9 months ago
Pared-down Poker: Cutting to the Core of Command and Control
Poker poses cognitive challenges like those of warfare, business and other real world domains. This makes poker a good test bed for basic research on how people make Command and Co...
Kevin Burns
176
Voted
AINA
2007
IEEE
15 years 5 months ago
Phygital Map: Accessing Digital Multimedia from Physical Map
— We present an augmented map interface called Phygital (physical, digital) Map that enables users to access digital multimedia stored in various off-the-shelf devices from physi...
Jin Nakazawa, Hideyuki Tokuda
132
Voted
RTCSA
2005
IEEE
15 years 9 months ago
FPGA-Based Content Protection System for Embedded Consumer Electronics
We propose a new architecture for a content protection system that conceals confidential data and algorithms in an FPGA as electrical circuits. This architecture is designed for a...
Hiroyuki Yokoyama, Kenji Toda
109
Voted
NSPW
2004
ACM
15 years 9 months ago
The user non-acceptance paradigm: INFOSEC's dirty little secret
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...