Sciweavers

3424 search results - page 500 / 685
» Building Diverse Computer Systems
Sort
View
CHI
2006
ACM
16 years 4 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
ICSE
2007
IEEE-ACM
16 years 4 months ago
A Perspective on the Future of Middleware-based Software Engineering
Middleware is a software layer that stands between the networked operating system and the application and provides well known reusable solutions to frequently encountered problems...
Mauro Caporuscio, Nikolaos Georgantas, Valé...
PERCOM
2005
ACM
16 years 3 months ago
Reducing the Calibration Effort for Location Estimation Using Unlabeled Samples
WLAN location estimation based on 802.11 signal strength is becoming increasingly prevalent in today's pervasive computing applications. As alternative to the wellestablished...
Xiaoyong Chai, Qiang Yang
SAC
2009
ACM
15 years 11 months ago
LTS semantics for use case models
Formalization is a necessary precondition for the specification of precise and unambiguous use case models, which serve as reference points for the design and implementation of so...
Daniel Sinnig, Patrice Chalin, Ferhat Khendek
ISPAN
2009
IEEE
15 years 11 months ago
Temperature Control Framework Using Wireless Sensor Networks and Geostatistical Analysis for Total Spatial Awareness
— This paper presents a novel framework for intelligent temperature control in smart homes using Wireless Sensor Networks (WSN) and geostatistical analysis for total spatial awar...
Charles C. Castello, Jeffrey Fan, Asad Davari, Rue...