Sciweavers

13224 search results - page 2618 / 2645
» Self-monitoring for Computer Users
Sort
View
FASE
2008
Springer
13 years 9 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
FPGA
2008
ACM
136views FPGA» more  FPGA 2008»
13 years 9 months ago
HybridOS: runtime support for reconfigurable accelerators
We present HybridOS, a set of operating system extensions for supporting fine-grained reconfigurable accelerators integrated with general-purpose computing platforms. HybridOS spe...
John H. Kelm, Steven S. Lumetta
APVIS
2007
13 years 9 months ago
A comparison of vertex ordering algorithms for large graph visualization
In this study, we examine the use of graph ordering algorithms for visual analysis of data sets using visual similarity matrices. Visual similarity matrices display the relationsh...
Christopher Mueller, Benjamin Martin, Andrew Lumsd...
BCSHCI
2007
13 years 9 months ago
An empirical investigation into dual-task trade-offs while driving and dialing
Engaging in a secondary task, such as dialing a cell phone, while driving a car has been found to have a deleterious effect on driver performance. A point often overlooked though ...
Duncan P. Brumby, Dario D. Salvucci, Andrew Howes
CLA
2007
13 years 9 months ago
An FDP-Algorithm for Drawing Lattices
In this work we want to discuss an algorithm for drawing line diagrams of lattices based on force directed placement (FDP). This widely used technique in graph drawing introduces f...
Christian Zschalig
« Prev « First page 2618 / 2645 Last » Next »