Sciweavers

416 search results - page 12 / 84
» Enough of Processes - Lets do Practices
Sort
View
CHI
2011
ACM
14 years 1 months ago
Post-deployment usability: a survey of current practices
Despite the growing research on usability in the predevelopment phase, we know little about post-deployment usability activities. To characterize these activities, we surveyed 333...
Parmit K. Chilana, Andrew J. Ko, Jacob O. Wobbrock...
NORDSEC
2009
Springer
15 years 4 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
MM
2004
ACM
109views Multimedia» more  MM 2004»
15 years 3 months ago
Practical voltage scaling for mobile multimedia devices
This paper presents the design, implementation, and evaluation of a practical voltage scaling (PDVS) algorithm for mobile devices primarily running multimedia applications. PDVS s...
Wanghong Yuan, Klara Nahrstedt
EUROCRYPT
2000
Springer
15 years 1 months ago
Security Aspects of Practical Quantum Cryptography
The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes are often operat...
Gilles Brassard, Norbert Lütkenhaus, Tal Mor,...
ISPDC
2010
IEEE
14 years 8 months ago
Practical Uniform Peer Sampling under Churn
—Providing independent uniform samples from a system population poses considerable problems in highly dynamic settings, like P2P systems, where the number of participants and the...
Roberto Baldoni, Marco Platania, Leonardo Querzoni...