Sciweavers

1116 search results - page 115 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
CTW
2004
81views more  CTW 2004»
15 years 16 days ago
Rating non-technical skills: developing a behavioural marker system for use in anaesthesia
Studies of performance in medicine are often based on observation. Videotape provides a valuable tool for recording events from both real environments and simulators. When analysin...
G. Fletcher, R. Flin, P. McGeorge, R. Glavin, N. M...
ASSETS
2008
ACM
15 years 2 months ago
A3: a coding guideline for HCI+autism research using video annotation
Due to the profile of strengths and weaknesses indicative of autism spectrum disorders (ASD), technology may play a key role in ameliorating communication difficulties with this p...
Joshua M. Hailpern, Karrie Karahalios, James Halle...
92
Voted
IADIS
2004
15 years 2 months ago
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth
The Shibboleth middleware from Internet2 provides a way for users at higher-education institutions to access remote electronic content in compliance with the inter-institutional l...
Sidharth Nazareth, Sean W. Smith
123
Voted
PLDI
2010
ACM
15 years 4 months ago
Detecting Inefficiently-Used Containers to Avoid Bloat
Runtime bloat degrades significantly the performance and scalability of software systems. An important source of bloat is the inefficient use of containers. It is expensive to cre...
Guoqing Xu, Atanas Rountev
147
Voted
SEC
2003
15 years 2 months ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera