Sciweavers

2270 search results - page 113 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
OMER
2001
13 years 10 months ago
Model-Based Design of ECU Software - A Component Based Approach
: This paper shows how architecture description languages can be tailored to the design of embedded automotive control software. Furthermore, graphical modeling means are put in an...
Ulrich Freund, Alexander Burst
ICALT
2010
IEEE
13 years 6 months ago
Modelling Affect in Learning Environments - Motivation and Methods
Emotions have a functional relevance to learning and achievement. Not surprisingly then, affective diagnoses are an important aspect of expert human mentoring. Computerbased learni...
Shazia Afzal, Peter Robinson
SP
2009
IEEE
14 years 3 months ago
Sphinx: A Compact and Provably Secure Mix Format
Sphinx is a cryptographic message format used to relay anonymized messages within a mix network. It is more compact than any comparable scheme, and supports a full set of security...
George Danezis, Ian Goldberg
HICSS
2008
IEEE
396views Biometrics» more  HICSS 2008»
14 years 3 months ago
The Use of the UTAUT Model in the Adoption of E-Government Services in Kuwait
E-government initiatives are in their infancy in many developing countries. The success of these initiatives is dependent on government support as well as citizens’ adoption of ...
Suha AlAwadhi, Anne Morris
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
14 years 3 months ago
A Model of Antecedents of RFID Adoption Intention in the Supply Chain
The application of the Radio Frequency Identification (RFID) technology in the supply chain has experienced increased attention in academic research and practice. There is, howeve...
Maria Madlberger