Sciweavers

694 search results - page 41 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
HPCC
2005
Springer
15 years 5 months ago
Performance Analysis of Shared-Memory Parallel Applications Using Performance Properties
Tuning parallel code can be a time-consuming and difficult task. We present our approach to automate the performance analysis of OpenMP applications that is based on the notion of ...
Karl Fürlinger, Michael Gerndt
WSC
1998
15 years 1 months ago
Business Process Modelling and Analysis Using Discrete-event Simulation
Globalisation and competitive pressure urge many organisations to radically change business processes. Although this approach can provide significant benefits such as reducing cos...
Vlatka Hlupic, Stewart Robinson
DIAU
2000
Springer
15 years 4 months ago
Protection Profiles for Remailer Mixes
In the past independent IT security evaluation according to published criteria has not realized its potential for the assessment of privacy enhancing technologies (PETs). Main rea...
Giovanni Iachello, Kai Rannenberg
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 6 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
MEDIAFORENSICS
2010
14 years 10 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain