Sciweavers

4486 search results - page 83 / 898
» Cross-Evaluation: A new model for information system evaluat...
Sort
View
CHI
2000
ACM
14 years 1 months ago
The cubic mouse: a new device for three-dimensional input
We have developed a new input device that allows users to intuitively specify three-dimensional coordinates in graphics applications. The device consists of a cubeshaped box with ...
Bernd Fröhlich, John Plate
CAI
2005
Springer
13 years 8 months ago
Development of Threat Evaluation Tool for Distributed Network Environment
Current information protection systems only detect and warn against individual intrusion, and are not able to provide a collective and synthesized alert message. In this paper, we ...
Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Ji-Yeon Ch...
ISW
2005
Springer
14 years 2 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
ECIS
2004
13 years 10 months ago
Inserting ICT and IS in a complex organisational environment using an organisational learning model
Within the last few years, knowledge management has become one of the hottest subjects among organisational and information systems theorists and practitioners. Many find in it an...
Silvina Santana
INFORMATIKTAGE
2008
13 years 10 months ago
Practical Secure Function Evaluation
: This thesis focuses on the practical aspects of general two-party Secure Function Evaluation (SFE). A new SFE protocol that allows free evaluation of XOR gates and is provably se...
Thomas Schneider 0003