Sciweavers

557 search results - page 4 / 112
» Two experiences designing for effective security
Sort
View
IJVR
2006
97views more  IJVR 2006»
13 years 7 months ago
Human-Scale Virtual Environment for Product Design: Effect of Sensory Substitution
-- This paper presents a human-scale virtual environment (VE) with haptic feedback along with two experiments performed in the context of product design. The user interacts with a ...
Paul Richard, Damien Chamaret, François-Xav...
SP
2008
IEEE
13 years 7 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight

Publication
220views
15 years 7 months ago
Exploiting the Impact of Database System Configuration Parameters: A Design of Experiments Approach
Tuning database system configuration parameters to proper values according to the expected query workload plays a very important role in determining DBMS performance. However, the ...
Biplob K. Debnath, Mohamed F. Mokbel, David J. Lil...
USS
2008
13 years 9 months ago
Experiences with Model Inference Assisted Fuzzing
In this paper we introduce the idea of model inference assisted fuzzing aimed to cost effectively improve software security. We experimented with several model inference technique...
Joachim Viide, Aki Helin, Marko Laakso, Pekka Piet...
IROS
2006
IEEE
119views Robotics» more  IROS 2006»
14 years 1 months ago
Designing simple and effective expression of robot's primitive minds to a human
— This paper describes designing expression of robot’s primitive minds in a simple and effective way. Although expression of robot’s minds like internal states is becoming a ...
Seiji Yamada, Takanori Komatsu