Sciweavers

1573 search results - page 174 / 315
» Strong User Authentication
Sort
View
ENVSOFT
2006
144views more  ENVSOFT 2006»
15 years 1 months ago
Ten iterative steps in development and evaluation of environmental models
Models are increasingly being relied upon to inform and support natural resource management. They are incorporating an ever broader range of disciplines and now often confront peo...
Anthony J. Jakeman, Rebecca A. Letcher, John P. No...
JCM
2006
112views more  JCM 2006»
15 years 1 months ago
A Peer-to-Peer Cooperation Enhancement Scheme and its Performance Analysis
The performance of peer-to-peer systems depends on the level of cooperation of the system's participants. While most existing peer-to-peer architectures have assumed that user...
Wei-Cherng Liao, Fragkiskos Papadopoulos, Konstant...
ICFEM
2010
Springer
15 years 11 days ago
Loop Invariant Synthesis in a Combined Domain
Abstract. Automated verification of memory safety and functional correctness for heap-manipulating programs has been a challenging task, especially when dealing with complex data ...
Shengchao Qin, Guanhua He, Chenguang Luo, Wei-Ngan...
EKNOW
2009
14 years 11 months ago
Towards a Context-Based Dialog Management Layer for Expert Systems
Knowledge engineering relies on a unified effort of two components for success: 1) a strong expert knowledge back-end, and 2) an effective user interface. We address the latter is...
Victor Chou Hung, Avelino J. Gonzalez, Ronald F. D...
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
15 years 8 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...