Sciweavers

3717 search results - page 424 / 744
» Architecture-Based Design of Computer Based Systems
Sort
View
CHI
2008
ACM
16 years 5 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
NOSSDAV
2004
Springer
15 years 10 months ago
Connectivity restrictions in overlay multicast
A large number of overlay multicast protocols have been developed, almost all of which assume universal connectivity between end hosts. However, in reality, this assumption is not...
Aditya Ganjam, Hui Zhang
IEEESCC
2010
IEEE
15 years 6 months ago
SecureSOA
Service-oriented Architectures (SOA) facilitate the provision and orchestration of business services to enable a faster adoption to changing business demands. Web Services provide...
Michael Menzel, Christoph Meinel
121
Voted
SAC
2002
ACM
15 years 4 months ago
Benefits of document maps for text access in knowledge management: a comparative study
Analyzing, structuring and organizing documented knowledge is an important aspect of knowledge management. In order to ease the access to text collections, in literature so-called...
Andreas Becks, Christian Seeling, Ralf Minkenberg
IFIP12
2009
15 years 2 months ago
Defining a Task's Temporal Domain for Intelligent Calendar Applications
Abstract Intelligent calendar assistants have many years ago attracted researchers from the areas of scheduling, machine learning and human computer interaction. However, all effor...
Anastasios Alexiadis, Ioannis Refanidis