Sciweavers

1770 search results - page 20 / 354
» Writing requirements in computer security
Sort
View
ETRA
2008
ACM
130views Biometrics» more  ETRA 2008»
13 years 9 months ago
Longitudinal evaluation of discrete consecutive gaze gestures for text entry
Eye-typing performance results are reported from controlled studies comparing an on-screen keyboard and EyeWrite, a new on-screen gestural input alternative. Results from the firs...
Jacob O. Wobbrock, James Rubinstein, Michael W. Sa...
PDP
2010
IEEE
13 years 12 months ago
Efficient Distribution of Virtual Machines for Cloud Computing
The commercial success of Cloud computing and recent developments in Grid computing have brought platform virtualization technology into the field of high performance computing. Vi...
Matthias Schmidt, Niels Fallenbeck, Matthew Smith,...
ISI
2006
Springer
13 years 7 months ago
Computational Modeling and Experimental Validation of Aviation Security Procedures
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
OSDI
1994
ACM
13 years 9 months ago
Storage Alternatives for Mobile Computers
Mobile computers such as notebooks, subnotebooks, and palmtops require low weight, low power consumption, and good interactive performance. These requirements impose many challeng...
Fred Douglis, Ramón Cáceres, M. Fran...
CSE
2009
IEEE
14 years 2 months ago
Privacy Requirements in Vehicular Communication Systems
Abstract—A primary goal of vehicular communication systems is the enhancement of traffic safety by equipping vehicles with wireless communication units to facilitate cooperative...
Florian Schaub, Zhendong Ma, Frank Kargl