Sciweavers

2006 search results - page 242 / 402
» Testing with Respect to Concerns
Sort
View
136
Voted
AVI
2006
15 years 5 months ago
Design and evaluation of a shoulder-surfing resistant graphical password scheme
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...
126
Voted
CIIT
2004
268views Communications» more  CIIT 2004»
15 years 5 months ago
SSM-ping: A ping utility for source specific multicast
Management has become a key concern for the success of multicast deployment in the Internet. One of the most important management tasks for multicast is to verify the availability...
Pavan Namburi, Kamil Saraç, Kevin C. Almero...
134
Voted
IADIS
2004
15 years 5 months ago
A Case Study on Research Assistant System From Knowledge Management Perspective
The purpose of this study is to develop a web-based Research Assistant System (RAS), a Knowledge Management System by community of practice, to improve the group performance of Re...
Jin Yang, Ming Huang
124
Voted
ECIS
2001
15 years 5 months ago
Back to the Future: From Knowledge Management to Data Management
This paper argues for a return to fundamentals as we enter the new millennium. It argues that the field of Information Systems should no longer be distracted from its natural locu...
Robert D. Galliers, Sue Newell
134
Voted
ICHIM
2001
113views more  ICHIM 2001»
15 years 5 months ago
A Content-Centered Methodology for Authoring 3D Interactive Worlds for Cultural Heritage
The application of 3D visualization technologies to cultural heritage has deeply evolved along years, shifting from the role of an ancillary technical solution to the dignity of a...
Augusto Celentano, Fabio Pittarello