Sciweavers

892 search results - page 58 / 179
» Risks of rapid application development
Sort
View
INFORMATICALT
2008
168views more  INFORMATICALT 2008»
13 years 10 months ago
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited compu...
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
EUROMED
2010
13 years 8 months ago
The Digital Archive of Sculptures of Tien-Shen Poo in Early Taiwan History
The traditional sculptures with posture and beauty are created by the fingers of sculptors, and these traditional techniques cannot be replaced by contemporary computer technologie...
Ying-Hsiu Huang
HICSS
2002
IEEE
119views Biometrics» more  HICSS 2002»
14 years 2 months ago
Task-Structure Analysis: A Modularized Approach for Modeling Knowledge Intensive Processes
Modular design methodologies, which decompose large and complex systems into components that are relatively easy to develop and maintain, have been widely adopted in the software ...
Roman M. Wong, Siddhartha Bhattacharyya
IAAI
1990
13 years 11 months ago
AudES - An Expert System for Security Auditing
Computer security auditing constitutes an important part of any organization's security procedures. Because of the many inadequacies of currently used manual methods, thoroug...
Gene Tsudik, Rita C. Summers
PADL
2009
Springer
14 years 10 months ago
Using Bloom Filters for Large Scale Gene Sequence Analysis in Haskell
Analysis of biological data often involves large data sets and computationally expensive algorithms. Databases of biological data continue to grow, leading to an increasing demand ...
Ketil Malde, Bryan O'Sullivan