Sciweavers

11603 search results - page 2190 / 2321
» Securing Embedded Systems
Sort
View
ACMICEC
2006
ACM
215views ECommerce» more  ACMICEC 2006»
15 years 8 months ago
Economics of online music and consumer behavior
In this paper we first provide a literature review about the economics of online music. Second, we then present an economical model for online music by incorporating various param...
Marc Fetscherin
ASSETS
2006
ACM
15 years 8 months ago
Wireless headset communications for vision impaired persons in multi-User environments
Wireless headsets are a great asset to Vision Impaired Persons (VIP’s) as they prove to be much easier to use and reliable than wired equivalents. Radio based wireless headsets ...
Iain Murray, Andrew Pasquale
ISSTA
2006
ACM
15 years 8 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
129
Voted
ITICSE
2006
ACM
15 years 8 months ago
Don't be a phish: steps in user education
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
Stefan A. Robila, James W. Ragucci
103
Voted
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 8 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
« Prev « First page 2190 / 2321 Last » Next »