Sciweavers

1770 search results - page 32 / 354
» Writing requirements in computer security
Sort
View
ISSAC
2005
Springer
94views Mathematics» more  ISSAC 2005»
14 years 1 months ago
Domains and expressions: an interface between two approaches to computer algebra
This paper describes a method to use compiled, strongly typed Aldor domains in the interpreted, expression-oriented Maple environment. This represents a non-traditional approach t...
Cosmin E. Oancea, Stephen M. Watt
IEEEARES
2007
IEEE
14 years 1 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
AIIDE
2007
13 years 10 months ago
Motivational Ambient and Latent Behaviors in Computer RPGs
Character behaviors in computer role-playing games have a significant impact on game-play, but are often difficult for game authors to implement and adapt. We present a behavior m...
Maria Cutumisu, Duane Szafron, Jonathan Schaeffer,...
ICDAR
2009
IEEE
14 years 2 months ago
Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations
The forensic investigation of a questioned signature written on a piece of paper is a challenging task. Electronic pen-tablets for recording writing movements are considered valua...
Katrin Franke
SAINT
2005
IEEE
14 years 1 months ago
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture ...
Antonio Corradi, Rebecca Montanari, Daniela Tibald...