Sciweavers

10159 search results - page 1991 / 2032
» System Design Validation Using Formal Models
Sort
View
CISS
2008
IEEE
14 years 2 months ago
Network distribution capacity and content-pipe gap
Abstract— The growth of video content and diversification of content-sharing methods in the Internet lead to an exciting range of new problems in networking, communications, and...
Mung Chiang
SOUPS
2005
ACM
14 years 1 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
CCS
2008
ACM
13 years 10 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
ICSE
2007
IEEE-ACM
14 years 8 months ago
Collaboration in Software Engineering: A Roadmap
Software engineering projects are inherently cooperative, requiring many software engineers to coordinate their efforts to produce a large software system. Integral to this effort...
Jim Whitehead
IUI
2010
ACM
14 years 4 months ago
A POMDP approach to P300-based brain-computer interfaces
Most of the previous work on non-invasive brain-computer interfaces (BCIs) has been focused on feature extraction and classification algorithms to achieve high performance for the...
Jaeyoung Park, Kee-Eung Kim, Sungho Jo
« Prev « First page 1991 / 2032 Last » Next »