Sciweavers

21324 search results - page 389 / 4265
» Making the case for computing
Sort
View
IEEESP
2006
108views more  IEEESP 2006»
15 years 5 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
202
Voted
CVPR
2012
IEEE
13 years 7 months ago
Robust non-rigid registration of 2D and 3D graphs
We present a new approach to matching graphs embedded in R2 or R3 . Unlike earlier methods, our approach does not rely on the similarity of local appearance features, does not req...
Eduard Serradell, Przemyslaw Glowacki, Jan Kybic, ...
149
Voted
AIS
2007
Springer
15 years 5 months ago
Crafts praxis for critical wearables design
This paper treats the contemporary craft market as an under-researched resource for wearable computing, and investigates the alternative values and experiences that contemporary c...
Sarah Kettley
147
Voted
DSRT
2006
IEEE
15 years 11 months ago
Grid-enabling FIRST: Speeding Up Simulation Applications Using WinGrid
The vision of grid computing is to make computational power, storage capacity, data and applications available to users as readily as electricity and other utilities. Grid infrast...
Navonil Mustafee, Anders Alstad, Bjorn Larsen, Sim...
174
Voted
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
15 years 5 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang