Sciweavers

274 search results - page 50 / 55
» Security user studies: methodologies and best practices
Sort
View
SACMAT
2009
ACM
14 years 1 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
TON
2002
116views more  TON 2002»
13 years 7 months ago
Managing capacity for telecommunications networks under uncertainty
The existing telecommunications infrastructure in most of the world is adequate to deliver voice and text applications, but demand for broadband services such as streaming video an...
Yann d'Halluin, Peter A. Forsyth, Kenneth R. Vetza...
SP
2008
IEEE
122views Security Privacy» more  SP 2008»
13 years 7 months ago
Large-scale phylogenetic analysis on current HPC architectures
Abstract. Phylogenetic inference is considered a grand challenge in Bioinformatics due to its immense computational requirements. The increasing popularity and availability of larg...
Michael Ott, Jaroslaw Zola, Srinivas Aluru, Andrew...
ACMIDC
2009
13 years 11 months ago
Drama prototyping for the design of urban interactive systems for children
In this paper, we present Wi-swing, a case study approach in designing a networked playground for children located in a public garden. The approach adopted in the case study is ba...
Andrea Alessandrini, Antonio Rizzo, Elisa Rubegni
WWW
2008
ACM
14 years 8 months ago
Improving relevance judgment of web search results with image excerpts
Current web search engines return result pages containing mostly text summary even though the matched web pages may contain informative pictures. A text excerpt (i.e. snippet) is ...
Zhiwei Li, Shuming Shi, Lei Zhang