Sciweavers

648 search results - page 111 / 130
» Software requirements validation via task analysis
Sort
View
INFOCOM
2003
IEEE
14 years 3 months ago
Physical Topology Discovery for Large Multi-Subnet Networks
— Knowledge of the up-to-date physical (i.e., layer-2) topology of an Ethernet network is crucial to a number of critical network management tasks, including reactive and proacti...
Yigal Bejerano, Yuri Breitbart, Minos N. Garofalak...
SIGCSE
2000
ACM
132views Education» more  SIGCSE 2000»
14 years 2 months ago
Empirical investigation throughout the CS curriculum
Empirical skills are playing an increasingly important role in the computing profession and our society. But while traditional computer science curricula are effective in teaching...
David W. Reed, Craig S. Miller, Grant Braught
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 5 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
ICSE
1993
IEEE-ACM
14 years 2 months ago
Prototyping a Process Monitoring Experiment
Features are often the basic unit of development for a very large software systems and represent long-term efforts, spanning up to several years from inception to actual use. Deve...
Mark G. Bradac, Dewayne E. Perry, Lawrence G. Vott...
CHI
2003
ACM
14 years 10 months ago
A context-aware experience sampling tool
A new software tool for user-interface development and assessment of ubiquitous computing applications is available for CHI researchers. The software permits researchers to use co...
Stephen S. Intille, John Rondoni, Chuck Kukla, Isa...