Sciweavers

2948 search results - page 183 / 590
» More Principled Design of Pervasive Computing Systems
Sort
View
DSN
2005
IEEE
15 years 10 months ago
User Interface Dependability through Goal-Error Prevention
User interfaces form a critical coupling between humans and computers. When the interface fails, the user fails, and the mission is lost. For example, in computer security applica...
Robert W. Reeder, Roy A. Maxion
HICSS
2006
IEEE
142views Biometrics» more  HICSS 2006»
15 years 10 months ago
Measuring the Effectiveness of Honeypot Counter-Counterdeception
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack...
Neil C. Rowe
CHI
2008
ACM
16 years 4 months ago
Design, adoption, and assessment of a socio-technical environment supporting independence for persons with cognitive disabilitie
A significant fraction of persons with cognitive disabilities are potentially able to live more independently with the use of powerful tools embedded in their social environment. ...
Stefan Carmien, Gerhard Fischer
ICDCS
2010
IEEE
15 years 8 months ago
Divide and Conquer Algorithms for Publish/Subscribe Overlay Design
Abstract—Overlay network design for topic-based publish/subscribe systems is of primary importance because the overlay directly impacts the system’s performance. Determining a ...
Chen Chen, Hans-Arno Jacobsen, Roman Vitenberg
ICSE
2003
IEEE-ACM
15 years 9 months ago
An Analysis of the Fault Correction Process in a Large-Scale SDL Production Model
Improvements in the software development process depend on our ability to collect and analyze data drawn from various phases of the development life cycle. Our design metrics rese...
Dolores M. Zage, Wayne M. Zage