Sciweavers

1479 search results - page 212 / 296
» Management without (Detailed) Models
Sort
View
ICCL
1998
IEEE
15 years 8 months ago
Transactions for Java
We present a design and implementation of transactions and general-purpose persistence for Java. These additions allow Java programmers to manipulate any Java object using transac...
Alex Garthwaite, Scott Nettles
ECRIME
2007
15 years 8 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
SOUPS
2010
ACM
15 years 8 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
CCGRID
2001
IEEE
15 years 8 months ago
Group Communication in Differentiated Services Networks
The Differentiated Services (DiffServ) approach will also bring benefits for multicast applications which need quality of service support. For instance, a highly reliable multicas...
Roland Bless, Klaus Wehrle
142
Voted
SPATIALCOGNITION
2000
Springer
15 years 8 months ago
Cognitive Zoom: From Object to Path and Back Again
This paper posits the usefulness of mental shifts of scale and perspective in thinking and communicating about spatial relations, and describes two experimental techniques for res...
Carol Strohecker