Sciweavers

761 search results - page 129 / 153
» Metadata Principles and Practicalities
Sort
View
CHI
2010
ACM
15 years 7 months ago
The true cost of unusable password policies: password use in the wild
HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We pr...
Philip Inglesant, Martina Angela Sasse
ICCAD
1997
IEEE
76views Hardware» more  ICCAD 1997»
15 years 6 months ago
Simulation methods for RF integrated circuits
Abstract — The principles employed in the development of modern RF simulators are introduced and the various techniques currently in use, or expected to be in use in the next few...
Kenneth S. Kundert
SODA
2008
ACM
126views Algorithms» more  SODA 2008»
15 years 3 months ago
On distributing symmetric streaming computations
A common approach for dealing with large data sets is to stream over the input in one pass, and perform computations using sublinear resources. For truly massive data sets, howeve...
Jon Feldman, S. Muthukrishnan, Anastasios Sidiropo...
ECIS
2000
15 years 3 months ago
Reclaiming Knowledge: A Case for Evidence-Based Information Systems
: Both the information base, on which IS research and practice is founded, and its accessibility continue to grow rapidly. A major challenge facing the IS community in the next dec...
Clare Atkins, Gail Louw
ENTCS
2008
73views more  ENTCS 2008»
15 years 2 months ago
Oracle-Based Partial Evaluation
We present Oracle-Based Partial Evaluation (OBPE), a novel approach to on-line Partial Evaluation (PE) which decides the control strategy to use for each call pattern by using an ...
Claudio Ochoa, Germán Puebla