Sciweavers

1733 search results - page 149 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
ECIR
1998
Springer
15 years 3 months ago
Evaluation of Interfaces for IRS: Modelling End-User Searching Behaviour
This paper describes an investigation in progress into the searching behaviour of end-users and how it is affected by interface design. The project focused on qualitative data gat...
Victoria Manglano, Micheline Beaulieu, Stephen E. ...
IEEESP
2007
98views more  IEEESP 2007»
15 years 1 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
ICTAI
2009
IEEE
15 years 8 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
CATA
2003
15 years 3 months ago
A Genetic Algorithm Approach to Static Task Scheduling in a Reconfigurable Hardware Environment
This paper presents a basic framework for applying static task scheduling techniques to arbitrarily-structured task systems whose targeted execution environment is comprised of fi...
Sin Ming Loo, B. Earl Wells, J. D. Winningham
USENIX
1990
15 years 2 months ago
Efficient User-Level File Cache Management on the Sun Vnode Interface
In developing a distributed file system, there are several good reasons for implementing the client file cache manager as a user-level process. These include ease of implementatio...
David C. Steere, James J. Kistler, Mahadev Satyana...