Sciweavers

1096 search results - page 152 / 220
» Software Architecture Analysis of Usability
Sort
View
154
Voted
EUROSYS
2011
ACM
14 years 7 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
118
Voted
ECTEL
2007
Springer
15 years 10 months ago
A Question Answering Service for Information Retrieval in Cooper
In Cooper, part of the student support will be provided by a Question Answering application in the form of a webservice. Question Answering allows a user to use the content of proj...
Bas Giesbers, Antonio Vincenzo Taddeo, Wim van der...
152
Voted
IJCNN
2006
IEEE
15 years 9 months ago
A Connectionist Approach to Speech Understanding
— This paper argues that connectionist systems are a good approach to implement a speech understanding computational model. In this direction, we propose SUM, a Speech Understand...
Daniel Nehme Müller, Mozart Lemos de Siqueira...
141
Voted
DATE
2003
IEEE
87views Hardware» more  DATE 2003»
15 years 9 months ago
A First Step Towards Hw/Sw Partitioning of UML Specifications
This paper proposes a novel methodology tailored to design embedded systems, taking into account the emerging market needs, such as hw/sw partitioning, object-oriented specificati...
William Fornaciari, P. Micheli, Fabio Salice, L. Z...
118
Voted
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr