Sciweavers

1407 search results - page 242 / 282
» Systems Theory Model for Information Security
Sort
View
TCS
2008
13 years 9 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
HICSS
2003
IEEE
103views Biometrics» more  HICSS 2003»
14 years 2 months ago
Modifying Adoption Research for Mobile Internet Service Adoption: Cross-Disciplinary Interactions
One often meets the argument that the adoption of mobile Internet services is difficult to understand due to a lack of relevant research. However, much research has already been c...
Per E. Pedersen, Rich Ling
FLAIRS
2006
13 years 10 months ago
Focusing Strategies for Multiple Fault Diagnosis
Diagnosing multiple faults for a complex system is often very difficult. It requires not only a model which adequately represents the diagnostic aspect of a complex system, but al...
Tsai-Ching Lu, K. Wojtek Przytula
TSMC
2008
134views more  TSMC 2008»
13 years 9 months ago
Expanding the Criteria for Evaluating Socio-Technical Software
Abstract--This paper compares two evaluation criterion frameworks for sociotechnical software. Research on the technology acceptance model (TAM) confirms that perceived usefulness ...
Brian Whitworth, Victor Bañuls, Cheickna Sy...
FLAIRS
2011
13 years 20 days ago
Intentional Analysis of Medical Conversations for Community Engagement
With an explosion in the proliferation of user-generated content in communities, information overload is increasing and quality of readily available online content is deterioratin...
Saurav Sahay