Sciweavers

2820 search results - page 492 / 564
» Learning from Scarce Experience
Sort
View
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 4 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
CODES
1998
IEEE
15 years 4 months ago
Hardware/software co-design of an ATM network interface card: a case study
This paper discusses a case study, the co-design of an ATM Network Interface Card (NIC). The NIC is aimed to interface applications with the physical network line. It is composed ...
Jean-Marc Daveau, Gilberto Fernandes Marchioro, Ah...
CAV
1998
Springer
103views Hardware» more  CAV 1998»
15 years 4 months ago
You Assume, We Guarantee: Methodology and Case Studies
Assume-guarantee reasoning has long been advertised as an important method for decomposing proof obligations in system veri cation. Re nement mappings (homomorphisms) have long bee...
Thomas A. Henzinger, Shaz Qadeer, Sriram K. Rajama...
CHI
1997
ACM
15 years 4 months ago
The Design of a GUI Paradigm based on Tablets, Two-hands, and Transparency
An experimental GUI paradigm is presented which is based on the design goals of maximizing the amount of screen used for application data, reducing the amount that the UI diverts ...
Gordon Kurtenbach, George W. Fitzmaurice, Thomas B...
IFIP
1993
Springer
15 years 4 months ago
Computer Science in Elementary and Secondary Schools
In this paper we examine the current computer science curriculum in elementary schools and identify its shortcomings. We then presents a new approach to teaching computer science ...
Viera K. Proulx