Sciweavers

5683 search results - page 964 / 1137
» Interactive Schedulability Analysis
Sort
View
HICSS
2006
IEEE
83views Biometrics» more  HICSS 2006»
15 years 10 months ago
Vigilance and Error Detection in an Automated Command and Control Environment
This study focused on improving vigilance performance through developing methods to arouse subjects to the possibility of errors in a data manipulation information warfare attack....
David P. Biros, Kent Marett, Brent T. Langhals
HICSS
2006
IEEE
110views Biometrics» more  HICSS 2006»
15 years 10 months ago
Risk Factors in Distributed Projects
In this manuscript we develop a conceptual understanding of how key risk factors associated with Information Technology development projects are magnified or multiplied when deali...
James M. Erickson, Roberto Evaristo
129
Voted
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
15 years 10 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 10 months ago
A Bridge Home: The Use of the Internet by Transnational Communities of Immigrants
For decades transnational communities of immigrants have used various forms of communication to maintain ties with their places of origin. The Internet constitutes an alternative ...
Celene Navarrete, Esperanza Huerta
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Scalability of Multimedia Applications on Next-Generation Processors
In the near future, the majority of personal computers are expected to have several processing units. This is referred to as Core Multiprocessing (CMP). Furthermore, each of the c...
Guy Amit, Yaron Caspi, Ran Vitale, Adi Pinhas