Sciweavers

674 search results - page 83 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
IJWIN
2006
209views more  IJWIN 2006»
13 years 10 months ago
On Connected Multiple Point Coverage in Wireless Sensor Networks
Abstract-- We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a s...
Shuhui Yang, Fei Dai, Mihaela Cardei, Jie Wu, Floy...
BMCBI
2010
133views more  BMCBI 2010»
13 years 10 months ago
Stability analysis of the GAL regulatory network in Saccharomyces cerevisiae and Kluyveromyces lactis
Background: In the yeast Saccharomyces cerevisiae, interactions between galactose, Gal3p, Gal80p, and Gal4p determine the transcriptional status of the genes required for the gala...
Vishwesh V. Kulkarni, Venkatesh Kareenhalli, Pushk...
CCS
2010
ACM
13 years 7 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
SIGSOFT
2004
ACM
14 years 11 months ago
PSE: explaining program failures via postmortem static analysis
In this paper, we describe PSE (Postmortem Symbolic Evaluation), a static analysis algorithm that can be used by programmers to diagnose software failures. The algorithm requires ...
Roman Manevich, Manu Sridharan, Stephen Adams, Man...
NORDICHI
2004
ACM
14 years 3 months ago
Procuring a usable system using unemployed personas
This case study examines a procurement project where the Swedish National Labor Market Administration (AMV) hired usability consultants in order to redesign their website for empl...
Erik Markensten, Henrik Artman