Sciweavers

1663 search results - page 40 / 333
» Computer Security in the Real World
Sort
View
CHI
2011
ACM
12 years 11 months ago
From the lab to the world: lessons from extending a pointing technique for real-world use
We present the Pointing Magnifier as a case study for understanding the issues and challenges of deploying lab-validated pointing facilitation techniques into the real world. The ...
Alex Jansen, Leah Findlater, Jacob O. Wobbrock
BIOSURVEILLANCE
2007
Springer
14 years 1 months ago
High Performance Computing for Disease Surveillance
Abstract. The global health, threatened by emerging infectious diseases, pandemic influenza, and biological warfare, is becoming increasingly dependent on the rapid acquisition, p...
David W. Bauer, Brandon W. Higgs, Mojdeh Mohtashem...
ISI
2004
Springer
14 years 29 days ago
SECRETS: A Secure Real-Time Multimedia Surveillance System
We propose a surveillance framework (SECRETS: SECure Real-time ElecTronic Surveillance) that is a practical solution to safeguarding sensitive physical facilities like command and ...
Naren Kodali, Csilla Farkas, Duminda Wijesekera
ESOP
2005
Springer
14 years 1 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
RTCSA
2006
IEEE
14 years 1 months ago
Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems
Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, i...
Kyoung-Don Kang, Sang Hyuk Son