Sciweavers

558 search results - page 20 / 112
» Safe and Effective Determinant Evaluation
Sort
View
IPPS
1999
IEEE
15 years 4 months ago
A Factorial Performance Evaluation for Hierarchical Memory Systems
In this study, we introduce an evaluation methodology for advanced memory systems. This methodology is based on statistical factorial analysis. It is two fold: it first determines...
Xian-He Sun, Dongmei He, Kirk W. Cameron, Yong Luo
CAISE
2006
Springer
15 years 1 months ago
Incremental Evaluation of OCL Constraints
: Integrity checking is aimed at determining whether an operation execution violates a given integrity constraint. To perform this computation efficiently, several incremental meth...
Jordi Cabot, Ernest Teniente
118
Voted
HCI
2009
14 years 9 months ago
Mobile Phone Usability Questionnaire (MPUQ) and Automated Usability Evaluation
The mobile phone has become one of the most popular products amongst today's consumers. The Mobile Phone Usability Questionnaire (MPUQ) was developed to provide an effective s...
Young Sam Ryu
SOUPS
2006
ACM
15 years 5 months ago
Web wallet: preventing phishing attacks by revealing user intentions
We introduce a new anti-phishing solution, the Web Wallet. The Web Wallet is a browser sidebar which users can use to submit their sensitive information online. It detects phishin...
Min Wu, Robert C. Miller, Greg Little
ACSAC
2003
IEEE
15 years 5 months ago
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
In this paper, we present a new approach for safe execution of untrusted programs by isolating their effects from the rest of the system. Isolation is achieved by intercepting fi...
Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar