Sciweavers

274 search results - page 15 / 55
» Security user studies: methodologies and best practices
Sort
View
HPDC
2010
IEEE
13 years 8 months ago
AzureBlast: a case study of developing science applications on the cloud
Cloud computing has emerged as a new approach to large scale computing and is attracting a lot of attention from the scientific and research computing communities. Despite its gro...
Wei Lu, Jared Jackson, Roger S. Barga
ICDE
2000
IEEE
144views Database» more  ICDE 2000»
13 years 11 months ago
Practical Lineage Tracing in Data Warehouses
We consider the view data lineage problem in a warehousing environment: For a given data item in a materialized warehouse view, we want to identify the set of source data items th...
Yingwei Cui, Jennifer Widom
ICCSA
2007
Springer
14 years 1 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...
HAPTICS
2006
IEEE
14 years 1 months ago
Haptic-Based Biometrics: A Feasibility Study
Biometric systems identify users based on behavioral or physiological characteristics. The advantages of such systems over traditional authentication methods such as passwords are...
Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Sh...
ISSE
2010
13 years 5 months ago
A second look at Faster, Better, Cheaper
“Faster, Better, Cheaper” (FBC) was a systems development methodology used by NASA in the 1990s. While usually a deprecated practice, we find that, with certain caveats, it is...
Oussama El-Rawas, Tim Menzies