Sciweavers

2266 search results - page 172 / 454
» How Not to Evaluate a Developmental System
Sort
View
HICSS
2003
IEEE
221views Biometrics» more  HICSS 2003»
15 years 3 months ago
"Applying TAM to E-Services Adoption: The Moderating Role of Perceived Risk"
Consumer adoption of e-services is an important goal for many service providers, however little is known about how different consumer segments perceive and evaluate them for adopt...
Mauricio Featherman, Mark A. Fuller
FMOODS
2007
14 years 11 months ago
Verifying Distributed, Event-Based Middleware Applications Using Domain-Specific Software Model Checking
The success of distributed event-based infrastructures such as SIENA and Elvin is partially due to their ease of use. Even novice users of these infrastructures not versed in distr...
L. Ruhai Cai, Jeremy S. Bradbury, Jürgen Ding...
COMPSEC
2006
132views more  COMPSEC 2006»
14 years 10 months ago
Tightening the net: A review of current and next generation spam filtering tools
This paper provides an overview of current and potential future spam filtering approaches. We examine the problems spam introduces, what spam is and how we can measure it. The pap...
James Carpinter, Ray Hunt
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 4 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
BVAI
2007
Springer
15 years 4 months ago
A Robotic Architecture with Innate Releasing Mechanism
In this paper we analyze the influence of the frequency of sensor data readings on the behaviours of a Robotic System (RS). This is done in the framework of behaviour based archit...
Ernesto Burattini, Silvia Rossi