Sciweavers

2281 search results - page 6 / 457
» Security Patterns and Secure Systems Design
Sort
View
67
Voted
SOUPS
2009
ACM
15 years 7 months ago
A multi-method approach for user-centered design of identity management systems
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
77
Voted
ACSAC
2008
IEEE
15 years 7 months ago
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System
Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Rob...
90
Voted
AGENTS
2001
Springer
15 years 5 months ago
Architectural design of a multi-agent system for handling metadata streams
Ï Ú × Ò ÑÙÐØ ¹ ÒØ Ö Ø ØÙÖ ØÓ Ð Ú Ö Ñ Ø ¹ Ø ×ØÖ Ñ× ×ÝÒ ÖÓÒÓÙ×ÐÝ Û Ø ÑÙÐØ Ñ ×ØÖ Ñ× ÓÚ Ö Û ¹ Ö Ò ØÛÓÖ º ÌÓ Ø × Ò...
Don Cruickshank, Luc Moreau, David De Roure
77
Voted
SAFECOMP
2001
Springer
15 years 5 months ago
About the Design of Distributed Control Systems: The Quasi-Synchronous Approach
Paul Caspi, Christine Mazuet, Natacha Reynaud Pali...
71
Voted
ISSE
2007
15 years 20 days ago
An intelligent system for automatic layout routing in aerospace design
Christian Van der Velden, Cees Bil, Xinghuo Yu, Ad...