Sciweavers

2004 search results - page 381 / 401
» Comparison of Model Checking Tools for Information Systems
Sort
View
CCS
2008
ACM
15 years 1 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
CHI
2006
ACM
16 years 4 days ago
UNIFORM: automatically generating consistent remote control user interfaces
A problem with many of today's appliance interfaces is that they are inconsistent. For example, the procedure for setting the time on alarm clocks and VCRs differs, even amon...
Jeffrey Nichols, Brad A. Myers, Brandon Rothrock
CHI
2006
ACM
16 years 4 days ago
Co-authoring with structured annotations
Most co-authoring tools support basic annotations, such as edits and comments that are anchored at specific locations in the document. However, they do not support metacommentary ...
Qixing Zheng, Kellogg S. Booth, Joanna McGrenere
HICSS
2008
IEEE
129views Biometrics» more  HICSS 2008»
15 years 6 months ago
Strategic Business and IT Alignment Assessment: A Case Study Applying an Enterprise Architecture-Based Metamodel
Strategic Business and IT Alignment (SBITA) is still ranked amongst the top concerns of the enterprise’s management executives. Such alignment is an organization-wide issue that...
Leonel Plazaola, Johnny Flores, Norman Vargas, Mat...
AINA
2006
IEEE
15 years 5 months ago
Simulation Architecture for Data Processing Algorithms in Wireless Sensor Networks
Abstract— Wireless sensor networks, by providing an unprecedented way of interacting with the physical environment, have become a hot topic for research over the last few years. ...
Yann-Aël Le Borgne, Mehdi Moussaid, Gianluca ...