Sciweavers

856 search results - page 99 / 172
» Design Guidance through the Controlled Application of Constr...
Sort
View
SOUPS
2005
ACM
14 years 2 months ago
Two experiences designing for effective security
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decision...
Rogério de Paula, Xianghua Ding, Paul Douri...
TNN
2008
124views more  TNN 2008»
13 years 8 months ago
Just-in-Time Adaptive Classifiers - Part II: Designing the Classifier
Aging effects, environmental changes, thermal drifts, and soft and hard faults affect physical systems by changing their nature and behavior over time. To cope with a process evolu...
Cesare Alippi, Manuel Roveri
IROS
2007
IEEE
162views Robotics» more  IROS 2007»
14 years 3 months ago
Comparative evaluation of robotic software integration systems: A case study
— One might expect that after nearly 50 years of research in robot manipulation and mobile robotics the architectural design of robot systems has converged to a small set of best...
Azamat Shakhimardanov, Erwin Prassler
CF
2006
ACM
14 years 19 days ago
An efficient cache design for scalable glueless shared-memory multiprocessors
Traditionally, cache coherence in large-scale shared-memory multiprocessors has been ensured by means of a distributed directory structure stored in main memory. In this way, the ...
Alberto Ros, Manuel E. Acacio, José M. Garc...
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
14 years 1 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo