Sciweavers

2604 search results - page 125 / 521
» Human Errors and System Requirements
Sort
View
CASES
2005
ACM
13 years 11 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua
CLEIEJ
2007
90views more  CLEIEJ 2007»
13 years 9 months ago
Software - Implemented Self-healing System
The term “Self-healing” denotes the capability of a software system in dealing with bugs. Fault tolerance for dependable computing is to provide the specified service through ...
Goutam Kumar Saha
ICASSP
2010
IEEE
13 years 9 months ago
Cover song detection: From high scores to general classification
Existing cover song detection systems require prior knowledge of the number of cover songs in a test set in order to identify cover(s) to a reference song. We describe a system th...
Suman Ravuri, Daniel P. W. Ellis
CHI
2005
ACM
14 years 9 months ago
Experimental analysis of mode switching techniques in pen-based user interfaces
Inking and gesturing are two central tasks in pen-based user interfaces. Switching between modes for entry of uninterpreted ink and entry of gestures is required by many pen-based...
Yang Li, Ken Hinckley, Zhiwei Guan, James A. Landa...
FC
2010
Springer
226views Cryptology» more  FC 2010»
14 years 11 days ago
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
Abstract. Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: (i) the attacker fully ob...
Toni Perkovic, Mario Cagalj, Nitesh Saxena