Sciweavers

1116 search results - page 115 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
CTW
2004
81views more  CTW 2004»
13 years 7 months ago
Rating non-technical skills: developing a behavioural marker system for use in anaesthesia
Studies of performance in medicine are often based on observation. Videotape provides a valuable tool for recording events from both real environments and simulators. When analysin...
G. Fletcher, R. Flin, P. McGeorge, R. Glavin, N. M...
ASSETS
2008
ACM
13 years 10 months ago
A3: a coding guideline for HCI+autism research using video annotation
Due to the profile of strengths and weaknesses indicative of autism spectrum disorders (ASD), technology may play a key role in ameliorating communication difficulties with this p...
Joshua M. Hailpern, Karrie Karahalios, James Halle...
IADIS
2004
13 years 9 months ago
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth
The Shibboleth middleware from Internet2 provides a way for users at higher-education institutions to access remote electronic content in compliance with the inter-institutional l...
Sidharth Nazareth, Sean W. Smith
PLDI
2010
ACM
14 years 18 hour ago
Detecting Inefficiently-Used Containers to Avoid Bloat
Runtime bloat degrades significantly the performance and scalability of software systems. An important source of bloat is the inefficient use of containers. It is expensive to cre...
Guoqing Xu, Atanas Rountev
SEC
2003
13 years 9 months ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera