Sciweavers

639 search results - page 90 / 128
» About Norms and Causes
Sort
View
CIIT
2004
132views Communications» more  CIIT 2004»
15 years 1 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
IASTEDSEA
2004
15 years 1 months ago
A framework for early robustness assessment
Time pressure and quality issues bring new challenges for developing web-based systems. The ability to analyze quality early in the development life cycle is crucial. Among the te...
Jianyun Zhou, Tor Stålhane
DICTA
2003
15 years 1 months ago
A Virtual Environment to Simulate the Experience of Psychosis
Abstract. Psychosis is a mental disorder that affects 1–2% of the population at some point in their lives. One of the main causes of psychosis is the mental illness schizophreni...
Jasmine Banks, Jennifer Tichon, Geoffery Ericksson...
GRAPHICSINTERFACE
2003
15 years 1 months ago
Finding Things In Fisheyes: Memorability in Distorted Spaces
Interactive fisheye views use distortion to show both local detail and global context in the same display space. Although fisheyes allow the presentation and inspection of large d...
Amy Skopik, Carl Gutwin
PST
2004
15 years 1 months ago
The Sensitivities of User Profile Information in Music Recommender Systems
Personalized services can cause privacy concerns, due to the acquisition, storage and application of sensitive personal information. This paper describes empirical research into th...
Evelien van de Garde-Perik, Boris E. R. de Ruyter,...