Sciweavers

105 search results - page 13 / 21
» Secure-system design methods: evolution and future direction...
Sort
View
IWC
2006
92views more  IWC 2006»
13 years 7 months ago
Awareness and teamwork in computer-supported collaborations
A contemporary approach to describing and theorizing about joint human endeavor is to posit `knowledge in common' as a basis for awareness and coordination. Recent analysis h...
John M. Carroll, Mary Beth Rosson, Gregorio Conver...
ACSAC
2005
IEEE
14 years 1 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
WWW
2006
ACM
14 years 8 months ago
Model-based version and configuration management for a web engineering lifecycle
During a lifecycle of a large-scale Web application, Web developers produce a wide variety of inter-related Web objects. Following good Web engineering practice, developers often ...
Tien Nhut Nguyen
ECML
2006
Springer
13 years 11 months ago
Efficient Non-linear Control Through Neuroevolution
Abstract. Many complex control problems are not amenable to traditional controller design. Not only is it difficult to model real systems, but often it is unclear what kind of beha...
Faustino J. Gomez, Jürgen Schmidhuber, Risto ...
FMCAD
2008
Springer
13 years 9 months ago
BackSpace: Formal Analysis for Post-Silicon Debug
Post-silicon debug is the problem of determining what's wrong when the fabricated chip of a new design behaves incorrectly. This problem now consumes over half of the overall ...
Flavio M. de Paula, Marcel Gort, Alan J. Hu, Steve...