Sciweavers

1377 search results - page 237 / 276
» Inference and Information Resources: A Design Case Study
Sort
View
CHI
2007
ACM
14 years 9 months ago
Multiple mice for retention tasks in disadvantaged schools
This study evaluates single-mouse and multiple-mouse configurations for computer-aided learning in schools where access to computers is limited due to resource constraints. Multim...
Udai Singh Pawar, Joyojeet Pal, Rahul Gupta, Kenta...
AUTOMATICA
2007
238views more  AUTOMATICA 2007»
13 years 8 months ago
Fundamental limit of discrete-time systems in tracking multi-tone sinusoidal signals
This paper studies the tracking performance of linear time-invariant multi-variable discrete-time systems. The specific problem under consideration is to track a multi-tone sinus...
Weizhou Su, Li Qiu, Jie Chen
CCS
2006
ACM
14 years 12 days ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
CCS
2007
ACM
14 years 2 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
DAWAK
2003
Springer
14 years 1 months ago
Performance Tests in Data Warehousing ETLM Process for Detection of Changes in Data Origin
In a data warehouse (DW) environment, when the operational environment does not posses or does not want to inform the data about the changes that occurred, controls have to be impl...
Rosana L. de B. A. Rocha, Leonardo Figueiredo Card...