Sciweavers

274 search results - page 37 / 55
» Security user studies: methodologies and best practices
Sort
View
OOPSLA
2000
Springer
15 years 1 months ago
Scalable propagation-based call graph construction algorithms
Propagation-based call graph construction algorithms have been studied intensively in the 1990s, and differ primarily in the number of sets that are used to approximate run-time v...
Frank Tip, Jens Palsberg
ISI
2006
Springer
14 years 9 months ago
Towards Optimal Police Patrol Routes with Genetic Algorithms
It is quite consensual that police patrolling can be regarded as one of the best well-known practices for implementing public-safety preventive policies towards the combat of an as...
Danilo Reis, Adriano Melo, André L. V. Coel...
ICPPW
2009
IEEE
14 years 7 months ago
Analyzing Checkpointing Trends for Applications on the IBM Blue Gene/P System
Current petascale systems have tens of thousands of hardware components and complex system software stacks, which increase the probability of faults occurring during the lifetime ...
Harish Gapanati Naik, Rinku Gupta, Pete Beckman
CHI
2009
ACM
15 years 10 months ago
Spectator understanding of error in performance
The development of computer-based devices for music control has created a need to study how spectators understand new performance technologies and practices. As a part of a larger...
A. Cavan Fyans, Michael Gurevich, Paul Stapleton
CHES
2003
Springer
106views Cryptology» more  CHES 2003»
15 years 3 months ago
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
For most of the time since they were proposed, it was widely believed that hyperelliptic curve cryptosystems (HECC) carry a substantial performance penalty compared to elliptic cur...
Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Ch...