Sciweavers

54 search results - page 3 / 11
» Security Design Patterns: Survey and Evaluation
Sort
View
GIL
2009
13 years 5 months ago
A Software Package for Managing and Evaluating DNA Sequence and Microsatellite Data
Abstract: We have surveyed three molecular biology labs in Germany and Vietnam to evaluate practical problems in the management of molecular genetics data. These labs are generatin...
Truong Van Chi Cong, Zhivko Duchev, Eildert Groene...
CHI
2010
ACM
13 years 7 months ago
Multitasking bar: prototype and evaluation of introducing the task concept into a browser
This paper clarifies two common patterns of multitasking on the Web, namely Multiple Tasks (MT) and Multiple Session Task (MST). To support both of these, the task concept needs t...
Qing Wang, Huiyou Chang
ASM
2008
ASM
13 years 9 months ago
Modeling Workflows, Interaction Patterns, Web Services and Business Processes: The ASM-Based Approach
Abstract. We survey the use of the Abstract State Machines (ASM) method for a rigorous foundation of modeling and validating web services, workflows, interaction patterns and busin...
Egon Börger, Bernhard Thalheim
FC
2001
Springer
123views Cryptology» more  FC 2001»
13 years 12 months ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
CHI
2005
ACM
14 years 7 months ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...