Sciweavers

274 search results - page 3 / 55
» Security user studies: methodologies and best practices
Sort
View
SIGIR
1996
ACM
13 years 11 months ago
Evaluating User Interfaces to Information Retrieval Systems: A Case Study on User Support
Designing good user interfaces to information retrieval systems is a complex activity. The design space is large and evaluation methodologies that go beyond the classical precisio...
Giorgio Brajnik, Stefano Mizzaro, Carlo Tasso
WWW
2005
ACM
14 years 8 months ago
Web services security configuration in a service-oriented architecture
Security is one of the major concerns when developing missioncritical business applications, and this concern motivated the Web Services Security specifications. However, the exis...
Takeshi Imamura, Michiaki Tatsubori, Yuichi Nakamu...
ICISS
2007
Springer
14 years 1 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
GECCO
2007
Springer
300views Optimization» more  GECCO 2007»
14 years 1 months ago
Methodology to select solutions from the pareto-optimal set: a comparative study
The resolution of a Multi-Objective Optimization Problem (MOOP) does not end when the Pareto-optimal set is found. In real problems, a single solution must be selected. Ideally, t...
José C. Ferreira, Carlos M. Fonseca, Ant&oa...
AGILEDC
2008
IEEE
14 years 1 months ago
Agile Methods and User-Centered Design: How These Two Methodologies are Being Successfully Integrated in Industry
A core principle of Agile development is to satisfy the customer by providing valuable software on an early and continuous basis. For a software application to be valuable it shou...
David Fox, Jonathan Sillito, Frank Maurer