Sciweavers

2446 search results - page 415 / 490
» Polyadic Concept Analysis
Sort
View
EMS
2008
IEEE
13 years 10 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
EMSOFT
2008
Springer
13 years 10 months ago
Disassembling real-time fault-tolerant programs
We focus on decomposition of hard-masking real-time faulttolerant programs (where safety, timing constraints, and liveness are preserved in the presence of faults) that are design...
Borzoo Bonakdarpour, Sandeep S. Kulkarni, Anish Ar...
ACL
2008
13 years 10 months ago
Multilingual Harvesting of Cross-Cultural Stereotypes
People rarely articulate explicitly what a native speaker of a language is already assumed to know. So to acquire the stereotypical knowledge that underpins much of what is said i...
Tony Veale, Yanfen Hao, Guofu Li
APCCM
2008
13 years 10 months ago
A Framework Based Measurements for Evaluating an IS Quality
There is an increasing community of researchers trying to draw attention to the importance of evaluation issues. Some approaches can be followed to evaluate the quality of softwar...
Olfa Lamouchi, Amar Ramdane-Cherif, Nicole L&eacut...
BCSHCI
2007
13 years 10 months ago
From HCI to media experience: methodological implications
The landscape of interactive technology design and evaluation is expanding. In the past, usability and task efficiency were the main focus for research in human computer interacti...
Elizabeth F. Churchill, Jeffrey Bardzell