Sciweavers

1949 search results - page 196 / 390
» Protective Interface Specifications
Sort
View
AISM
2004
15 years 4 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
APBC
2004
107views Bioinformatics» more  APBC 2004»
15 years 4 months ago
An Empirical Bayes Adjustment to Multiple p-values for the Detection of Differentially Expressed Genes in Microarray Experiments
In recent microarray experiments thousands of gene expressions are simultaneously tested in comparing samples (e.g., tissue types or experimental conditions). Application of a sta...
Somnath Datta, Susmita Datta
SSWMC
2004
15 years 4 months ago
Signature-embedding in printed documents for security and forensic applications
Despite the increase in email and other forms of digital communication, the use of printed documents continues to increase every year. Many types of printed documents need to be &...
Aravind K. Mikkilineni, Gazi N. Ali, Pei-Ju Chiang...
ECSCW
1993
15 years 4 months ago
Culture and Control in a Media Space
: Media spaces integrate audio, video and computer networking technology in order to provide a rich communicative environment for collaboration. The connectivity which they provide...
Paul Dourish
CACM
2008
100views more  CACM 2008»
15 years 3 months ago
TxLinux and MetaTM: transactional memory and the operating system
TxLinux is the first operating system to use hardware transactional memory (HTM) as a synchronization primitive, and the first to manage HTM in the scheduler. TxLinux, which is a ...
Christopher J. Rossbach, Hany E. Ramadan, Owen S. ...