Sciweavers

274 search results - page 28 / 55
» Security user studies: methodologies and best practices
Sort
View
BMCBI
2008
128views more  BMCBI 2008»
14 years 10 months ago
HAPSIMU: a genetic simulation platform for population-based association studies
Background: Population structure is an important cause leading to inconsistent results in population-based association studies (PBAS) of human diseases. Various statistical method...
Feng Zhang, Jianfeng Liu, Jie Chen, Hong-Wen Deng
DSN
2003
IEEE
15 years 3 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
WISTP
2007
Springer
15 years 3 months ago
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
Abstract. For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to ...
Walter Bamberger, Oliver Welter, Stephan Spitz
ESCIENCE
2007
IEEE
15 years 4 months ago
Cross-Middleware Interoperability in Distributed Concurrent Engineering
Secure, distributed collaboration between different organizations is a key challenge in Grid computing today. The GDCD project has produced a Grid-based demonstrator Virtual Colla...
E. Rowland Watkins, Mark McArdle, Thomas Leonard, ...
APVIS
2011
13 years 9 months ago
An extended evaluation of the readability of tapered, animated, and textured directed-edge representations in node-link graphs
We present the results of a study comparing five directed-edge representations for use in 2D, screen-based node-link diagrams. The goal of this work is to extend the understandin...
Danny Holten, Petra Isenberg, Jarke J. van Wijk, J...