Sciweavers

1573 search results - page 273 / 315
» Strong User Authentication
Sort
View
HICSS
2003
IEEE
105views Biometrics» more  HICSS 2003»
15 years 3 months ago
Does the Extended Technology Acceptance Model Apply to Physicians
In previous studies, the technology acceptance model (TAM) [1] has been widely used by information technology researchers to gain a better understanding of information technology ...
William G. Chismar, Sonja Wiley-Patton
HPDC
2003
IEEE
15 years 3 months ago
A Performance Study of Monitoring and Information Services for Distributed Systems
Monitoring and information services form a key component of a distributed system, or Grid. A quantitative study of such services can aid in understanding the performance limitatio...
Xuehai Zhang, Jeffrey L. Freschl, Jennifer M. Scho...
ISESE
2003
IEEE
15 years 3 months ago
An Experimental Evaluation of Inspection and Testing for Detection of Design Faults
The two most common strategies for verification and validation, inspection and testing, are in a controlled experiment evaluated in terms of their fault detection capabilities. Th...
Carina Andersson, Thomas Thelin, Per Runeson, Nina...
ACMICEC
2003
ACM
113views ECommerce» more  ACMICEC 2003»
15 years 3 months ago
PayCash: a secure efficient Internet payment system
This paper describes PayCash, an Internet payment system that was designed to offer strong security and privacy protection. This system is based on the concept of electronic cash,...
Jon M. Peha, Ildar M. Khamitov
ERCIMDL
2003
Springer
116views Education» more  ERCIMDL 2003»
15 years 3 months ago
Connecting Interface Metaphors to Support Creation of Path-Based Collections
Abstract. Walden’s Paths is a suite of tools that supports the creation and presentation of linear hypermedia paths—targeted collections that enable authors to reorganize and c...
Unmil Karadkar, Andruid Kerne, Richard Furuta, Lui...