Sciweavers

3516 search results - page 631 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
123
Voted
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
15 years 10 months ago
The Factors that Affect the Implementation Success of IS
How to implement an IS (information system) successfully remains a problem. To address this, drawing on information processing theory, this study proposes an integrated model that...
Shih-Wei Chou, Mong-Young He, Pi-Yi Chen
142
Voted
CGI
2006
IEEE
15 years 9 months ago
Spline Thin-Shell Simulation of Manifold Surfaces
It has been technically challenging to effectively model and simulate elastic deformation of spline-based, thin-shell objects of complicated topology. This is primarily because tra...
Kexiang Wang, Ying He 0001, Xiaohu Guo, Hong Qin
149
Voted
CONCURRENCY
2002
152views more  CONCURRENCY 2002»
15 years 3 months ago
The Legion Grid Portal
-- The Legion Grid Portal is an interface to a grid system. Users interact with the portal, and hence a grid through an intuitive interface from which they can view files, submit a...
Anand Natrajan, Anh Nguyen-Tuong, Marty Humphrey, ...
ICSE
2000
IEEE-ACM
15 years 7 months ago
Software engineering and performance: a road-map
Software engineering has traditionally focussed on functional requirements and how to build software that has few bugs and can be easily maintained. Most design approaches include...
Rob Pooley
148
Voted
EUROCRYPT
2004
Springer
15 years 9 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung