Sciweavers

1522 search results - page 277 / 305
» Requirements analysis for large scale systems
Sort
View
DIM
2009
ACM
14 years 6 days ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
WETICE
2000
IEEE
13 years 12 months ago
CollabLogger: A Tool for Visualizing Groups at Work
The CollabLogger is a visual tool that supports usability analyses of human-computer interaction in a team environment. Participants in our computer-mediated activity were engaged...
Emile L. Morse, Michelle Potts Steves
HPCA
1997
IEEE
13 years 11 months ago
ATM and Fast Ethernet Network Interfaces for User-Level Communication
Fast Ethernet and ATM are two attractive network technologies for interconnecting workstation clusters for parallel and distributed computing. This paper compares network interfac...
Matt Welsh, Anindya Basu, Thorsten von Eicken
CIKM
2004
Springer
13 years 11 months ago
InfoAnalyzer: a computer-aided tool for building enterprise taxonomies
In this paper we study the problem of collecting training samples for building enterprise taxonomies. We develop a computer-aided tool named InfoAnalyzer, which can effectively as...
Li Zhang, Shixia Liu, Yue Pan, Liping Yang
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
13 years 11 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang