Sciweavers

1818 search results - page 176 / 364
» How users use access control
Sort
View
SEKE
2004
Springer
14 years 3 months ago
Visualizing the evolution of software using softChange
A typical software development team leaves behind a large amount of information. This information takes different forms, such as mail messages, software releases, version control ...
Daniel M. Germán, Abram Hindle, Norman Jord...
IWEC
2007
13 years 11 months ago
Using Narrative Cases to Author Interactive Story Content
Interactive storytelling is a rapidly emerging field that tries to reconcile story-like experiences with user control. These forces oppose each other, as story implies predetermin...
Ivo Swartjes
IJDE
2006
95views more  IJDE 2006»
13 years 9 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
SIGMOD
2011
ACM
331views Database» more  SIGMOD 2011»
13 years 15 days ago
Query optimization techniques for partitioned tables
Table partitioning splits a table into smaller parts that can be accessed, stored, and maintained independent of one another. From their traditional use in improving query perform...
Herodotos Herodotou, Nedyalko Borisov, Shivnath Ba...
GD
2008
Springer
13 years 10 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...