Sciweavers

3482 search results - page 77 / 697
» Designing for security
Sort
View
GECCO
2007
Springer
175views Optimization» more  GECCO 2007»
14 years 3 months ago
An evolutionary multiobjective approach to design highly non-linear Boolean functions
The proliferation of all kinds of devices with different security requirements and constraints, and the arms-race nature of the security problem are increasingly demanding the de...
Hernán E. Aguirre, Hiroyuki Okazaki, Yasush...
WICSA
2008
13 years 10 months ago
uDesign: End-User Design Applied to Monitoring and Control Applications for Smart Spaces
This paper introduces an architectural style for enabling end-users to quickly design and deploy software systems in domains characterized by highly personalized and dynamic requi...
João Pedro Sousa, Bradley R. Schmerl, Vahe ...
CHI
2007
ACM
14 years 9 months ago
Protecting people from phishing: the design and evaluation of an embedded training email system
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acqu...
ICDIM
2008
IEEE
14 years 3 months ago
Towards e-Government: The security SOA approach of the University of Murcia
This paper describes the experience of the University of Murcia in the design and development of security SOA infrastructures for electronic government, which provide university c...
Daniel Sánchez-Martínez, C. Inmacula...
SIGSOFT
2010
ACM
13 years 6 months ago
Software engineering issues for mobile application development
This paper provides an overview of important software engineering research issues related to the development of applications that run on mobile devices. Among the topics are devel...
Anthony I. Wasserman