Sciweavers

298 search results - page 21 / 60
» Computer security: quality rather than quantity
Sort
View
CHI
2005
ACM
14 years 10 months ago
Preliminary evaluation of the interactive drama facade
There is growing interest in technologies that support user experiences emphasizing aesthetic satisfaction and enjoyment rather than task accomplishment. Evaluating such experienc...
Rachel Lee Knickmeyer, Michael Mateas
ACSAC
2003
IEEE
14 years 3 months ago
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to comp...
Steven Noel, Sushil Jajodia, Brian O'Berry, Michae...
ENTCS
2007
110views more  ENTCS 2007»
13 years 9 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone
ICSE
1999
IEEE-ACM
14 years 2 months ago
Experience with Performing Architecture Tradeoff Analysis
Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and the...
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy...
ICCVW
1999
Springer
14 years 2 months ago
Bundle Adjustment - A Modern Synthesis
This paper is a survey of the theory and methods of photogrammetric bundle adjustment, aimed at potential implementors in the computer vision community. Bundle adjustment is the p...
Bill Triggs, Philip F. McLauchlan, Richard I. Hart...