Sciweavers

177 search results - page 16 / 36
» eWatch: Context Sensitive System Design Case Study
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 1 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
EMSOFT
2007
Springer
14 years 1 months ago
Methods for multi-dimensional robustness optimization in complex embedded systems
Design space exploration of embedded systems typically focuses on classical design goals such as cost, timing, buffer sizes, and power consumption. Robustness criteria, i.e. sensi...
Arne Hamann, Razvan Racu, Rolf Ernst
DIGRA
2005
Springer
14 years 1 months ago
Theory as Game: Designing the Game Game
Is there a way to analyze games by the means of a game? Is there a way to brainstorm game ideas and design solutions through theory? Finnish scholar and game designer Aki Järvine...
Aki Järvinen
IADIS
2003
13 years 9 months ago
Automatic Gui Generation in Web Based Information Systems
The HCI subsystem is an essential component of an Information System, whose success inside an organization strongly depend on user acceptance. A good UI design considering usabili...
Nicola Aloia, Cesare Concordia, Maria Teresa Parat...
ADAPTIVE
2007
Springer
14 years 1 months ago
Adaptive News Access
This chapter describes how the adaptive web technologies discussed in this book have been applied to news access. First, we provide an overview of different types of adaptivity in ...
Daniel Billsus, Michael J. Pazzani