Sciweavers

694 search results - page 29 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
MOBISYS
2009
ACM
16 years 10 days ago
mFerio: the design and evaluation of a peer-to-peer mobile payment system
In this paper, we present the design and evaluation of a nearfield communication-based mobile p2p payment application called mFerio which is designed to replace cash-based transac...
Rajesh Krishna Balan, Narayan Ramasubbu, Komsit Pr...
IJNSEC
2010
163views more  IJNSEC 2010»
14 years 6 months ago
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against...
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, M...
WSC
1996
15 years 1 months ago
Experimental Evaluation of Confidence Interval Procedures in Sequential Steady-State Simulation
Sequential analysis of simulation output is generally accepted as the most efficient way for securing representativeness of samples of collected observations. In this scenario a s...
Donald C. McNickle, Krzysztof Pawlikowski, Gregory...
CIVR
2008
Springer
152views Image Analysis» more  CIVR 2008»
15 years 1 months ago
Evaluating audio skimming and frame rate acceleration for summarizing BBC rushes
For the first time in 2007, TRECVID considered structured evaluation of automated video summarization, utilizing BBC rushes video. In 2007, we conducted user evaluations with the ...
Michael G. Christel, Wei-Hao Lin, Bryan Maher
SEC
2007
15 years 1 months ago
Trust Evaluation for Web Applications based on Behavioral Analysis
This paper deals with a joint use of a trust evaluation approach and access control mechanisms for improving security in Web-usage. Trust evaluation is achieved by means of both be...
Luiz Fernando Rust C. Carmo, Breno G. de Oliveira,...