Sciweavers

63 search results - page 9 / 13
» Investigating user account control practices
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks
—The design of computer and communication systems has been based, for decades, on the fundamental assumption that the objective of all users is to improve their own performance. ...
Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy
VMV
2000
146views Visualization» more  VMV 2000»
13 years 9 months ago
Matching 3D Freeform Shapes to Digitized Objects
In this paper the problem of matching freeform surface features against measured point data is studied. The motivation for this investigation is the recent demand for fast and rob...
Joris S. M. Vergeest, Sander Spanjaard, Jos J. O. ...
VIP
2003
13 years 9 months ago
Web-based Multimedia GP Medical System
This paper introduced GP-Soft, a powerful new patient management system, which is designed to improve the records management for clinic, nursing home and hospital. GP-Soft is a co...
Chee Chern Lim, Man Hing Yu, Jesse J. Jin
ISESE
2003
IEEE
14 years 26 days ago
An Experimental Evaluation of Inspection and Testing for Detection of Design Faults
The two most common strategies for verification and validation, inspection and testing, are in a controlled experiment evaluated in terms of their fault detection capabilities. Th...
Carina Andersson, Thomas Thelin, Per Runeson, Nina...
CIKM
2006
Springer
13 years 11 months ago
Concept-based document readability in domain specific information retrieval
Domain specific information retrieval has become in demand. Not only domain experts, but also average non-expert users are interested in searching domain specific (e.g., medical a...
Xin Yan, Dawei Song, Xue Li