Sciweavers

2956 search results - page 243 / 592
» Targeted Data Prefetching
Sort
View
CHI
2010
ACM
15 years 10 months ago
A case study of micro-blogging in the enterprise: use, value, and related issues
This is a case study about the early adoption and use of micro-blogging in a Fortune 500 company. The study used several independent data sources: five months of empirical micro-b...
Jun Zhang, Yan Qu, Jane Cody, Yulingling Wu
IEEEARES
2009
IEEE
15 years 10 months ago
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests
—The security assessment of the ICT components of critical infrastructures is nowadays a prominent problem. Risk assessment methodologies require, in order to be effective, to be...
Marcelo Masera, Igor Nai Fovino
130
Voted
ICICS
2009
Springer
15 years 10 months ago
Biometric-Based Non-transferable Anonymous Credentials
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
Marina Blanton, William M. P. Hudelson
123
Voted
DATE
2008
IEEE
99views Hardware» more  DATE 2008»
15 years 10 months ago
Subsystem Exchange in a Concurrent Design Process Environment
This paper provides insight into the novel solutions used to build SoCs targeting increased productivity in a complex environment. Design of such SoCs relies on multi-team, multi-...
Marino Strik, Alain Gonier, Paul Williams
197
Voted
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
15 years 10 months ago
Skype Fingerprint
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
Ronald C. Dodge Jr.