Sciweavers

327 search results - page 50 / 66
» Integrated Risk Analysis for a Commercial Computing Service
Sort
View
HCI
2009
14 years 10 months ago
User Centered Design of a Learning Object Repository
This work outlines the design process of a user centered learning object repository. A repository should foster the development and acquisition of both generic and specific informa...
Núria Ferran, Ana-Elena Guerrero-Rold&aacut...
102
Voted
CSREASAM
2006
15 years 1 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
101
Voted
DRM
2004
Springer
15 years 5 months ago
DRM as a layered system
The current landscape for digital rights management (DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the...
Pramod A. Jamkhedkar, Gregory L. Heileman
105
Voted
IEEEPACT
2006
IEEE
15 years 6 months ago
Whole-program optimization of global variable layout
On machines with high-performance processors, the memory system continues to be a performance bottleneck. Compilers insert prefetch operations and reorder data accesses to improve...
Nathaniel McIntosh, Sandya Mannarswamy, Robert Hun...
90
Voted
SAFECOMP
2001
Springer
15 years 4 months ago
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models
This paper focuses on the development of a conceptual framework for integrating fault injection mechanisms into the RDD-100 tool2 to support the dependability analysis of computer...
Mohamed Kaâniche, Yannick Le Guédart,...