Sciweavers

2216 search results - page 101 / 444
» Integration of Usability Techniques into the Software Develo...
Sort
View
ACSAC
2002
IEEE
15 years 3 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
BIRTHDAY
2005
Springer
15 years 3 months ago
Towards MultiMedia Instruction in Safe and Secure Systems
Abstract. The aim of the MMiSS project is the construction of a multimedia Internet-based adaptive educational system. Its content will initially cover a whole curriculum in the ar...
Bernd Krieg-Brückner
APSEC
2002
IEEE
15 years 3 months ago
Integrating Use-Case Analysis and Task Analysis for Interactive Systems
This paper presents an integrated process model of use-case driven analysis and task analysis for developing interactive systems. In the process model, an analysis model is develo...
Soon-Kyeong Kim, David A. Carrington
69
Voted
WWW
2003
ACM
15 years 10 months ago
TSpaces Services Suite: Automating the Development and Management of Web Services
Web services allow authorized entities (including individuals, corporations, and automated agents) to employ software components created by other parties scattered across the glob...
Marcus Fontoura, Tobin J. Lehman, Dwayne Nelson, T...
CODES
1999
IEEE
15 years 2 months ago
Using codesign techniques to support analog functionality
With the growth of System on a Chip (SoC), the functionality of analog components must also be considered in the design process. This paper describes some of the design implementa...
Francis G. Wolff, Michael J. Knieser, Daniel J. We...