Sciweavers

26354 search results - page 153 / 5271
» How we refactor, and how we know it
Sort
View
TIT
2008
81views more  TIT 2008»
13 years 10 months ago
How to Filter an "Individual Sequence With Feedback"
We consider causally estimating (filtering) the components of a noise-corrupted sequence relative to a reference class of filters. The noiseless sequence to be filtered is designe...
Tsachy Weissman
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 8 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
COMPSAC
2008
IEEE
14 years 4 months ago
How to Enhance UDDI with Dependability Capabilities
How dependability is to be assessed and ensured during Web Service operation and how unbiased and trusted mechanisms supporting this are to be developed are still open issues. Thi...
Anatoliy Gorbenko, Alexander Romanovsky, Vyachesla...
DPPI
2007
ACM
14 years 2 months ago
From entry to access: how shareability comes about
Abstract. Shareability is a design principle that refers to how a system, interface, or device engages a group of collocated, co-present users in shared interactions around the sam...
Eva Hornecker, Paul Marshall, Yvonne Rogers
BCSHCI
2008
13 years 12 months ago
An eye tracking study of how font size and type influence online reading
In order to maximize online reading performance and comprehension, how should a designer choose typographical variables such as font size and font type? This paper presents an eye...
David Beymer, Daniel M. Russell, Peter Z. Orton