Sciweavers

1818 search results - page 176 / 364
» How users use access control
Sort
View
112
Voted
SEKE
2004
Springer
15 years 8 months ago
Visualizing the evolution of software using softChange
A typical software development team leaves behind a large amount of information. This information takes different forms, such as mail messages, software releases, version control ...
Daniel M. Germán, Abram Hindle, Norman Jord...
102
Voted
IWEC
2007
15 years 4 months ago
Using Narrative Cases to Author Interactive Story Content
Interactive storytelling is a rapidly emerging field that tries to reconcile story-like experiences with user control. These forces oppose each other, as story implies predetermin...
Ivo Swartjes
135
Voted
IJDE
2006
95views more  IJDE 2006»
15 years 2 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
168
Voted
SIGMOD
2011
ACM
331views Database» more  SIGMOD 2011»
14 years 5 months ago
Query optimization techniques for partitioned tables
Table partitioning splits a table into smaller parts that can be accessed, stored, and maintained independent of one another. From their traditional use in improving query perform...
Herodotos Herodotou, Nedyalko Borisov, Shivnath Ba...
136
Voted
GD
2008
Springer
15 years 3 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...