Sciweavers

274 search results - page 47 / 55
» Security user studies: methodologies and best practices
Sort
View
SERP
2004
13 years 8 months ago
Locating Features in Distributed Systems
In distributed systems, just as in conventional software, it is often necessary to locate the software components that implement a particular user feature. Several dynamic analysi...
Sharon Simmons, Dennis Edwards, Norman Wilde
CE
2008
128views more  CE 2008»
13 years 7 months ago
Beyond threaded discussion: Representational guidance in asynchronous collaborative learning environments
Although most online learning environments are predominately text based, researchers have argued that representational support for the conceptual structure of a problem would addr...
Daniel D. Suthers, Ravi K. Vatrapu, Richard Medina...
VISUALIZATION
2005
IEEE
14 years 29 days ago
Eyegaze Analysis of Displays With Combined 2D and 3D Views
Displays combining both 2D and 3D views have been shown to support higher performance on certain visualization tasks. However, it is not clear how best to arrange a combination of...
Melanie Tory, M. Stella Atkins, Arthur E. Kirkpatr...
CEC
2008
IEEE
14 years 1 months ago
Policy evolution with Genetic Programming: A comparison of three approaches
— In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is now much more complex. Subt...
Yow Tzu Lim, Pau-Chen Cheng, John Andrew Clark, Pa...
DRM
2006
Springer
13 years 11 months ago
Proteus: virtualization for diversified tamper-resistance
Despite huge efforts by software providers, software protection mechanisms are still broken on a regular basis. Due to the current distribution model, an attack against one copy o...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...