Sciweavers

6709 search results - page 1184 / 1342
» Impacting the Learning Experience
Sort
View
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
14 years 2 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
CODES
1998
IEEE
14 years 2 months ago
Hardware/software co-design of an ATM network interface card: a case study
This paper discusses a case study, the co-design of an ATM Network Interface Card (NIC). The NIC is aimed to interface applications with the physical network line. It is composed ...
Jean-Marc Daveau, Gilberto Fernandes Marchioro, Ah...
IDA
1999
Springer
14 years 2 months ago
Reasoning about Input-Output Modeling of Dynamical Systems
The goal of input-output modeling is to apply a test input to a system, analyze the results, and learn something useful from the causeeffect pair. Any automated modeling tool that...
Matthew Easley, Elizabeth Bradley
CAV
1998
Springer
103views Hardware» more  CAV 1998»
14 years 2 months ago
You Assume, We Guarantee: Methodology and Case Studies
Assume-guarantee reasoning has long been advertised as an important method for decomposing proof obligations in system veri cation. Re nement mappings (homomorphisms) have long bee...
Thomas A. Henzinger, Shaz Qadeer, Sriram K. Rajama...
CHI
1997
ACM
14 years 2 months ago
KidPad: A Design Collaboration Between Children, Technologists, and Educators
We established an interdisciplinary, intergenerational collaboration in the fall of 1995, between the University of New Mexico's Computer Science Department, the College of E...
Allison Druin, Jason Stewart, David Proft, Benjami...
« Prev « First page 1184 / 1342 Last » Next »