Sciweavers

189 search results - page 35 / 38
» The Illusion of Effective Management Information: A Critical...
Sort
View
VIZSEC
2005
Springer
15 years 3 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...
CODES
2008
IEEE
14 years 11 months ago
Application specific non-volatile primary memory for embedded systems
Memory subsystems have been considered as one of the most critical components in embedded systems and furthermore, displaying increasing complexity as application requirements div...
Kwangyoon Lee, Alex Orailoglu
LOCA
2005
Springer
15 years 3 months ago
Classifying the Mobility of Users and the Popularity of Access Points
Abstract. There is increasing interest in location-aware systems and applications. It is important for any designer of such systems and applications to understand the nature of use...
Minkyong Kim, David Kotz
CHI
2011
ACM
14 years 1 months ago
Usability of car dashboard displays for elder drivers
The elder population is rising worldwide; in the US, no longer being able to drive is a significant marker of loss of independence. One of the approaches to helping elders drive m...
Seungjun Kim, Anind K. Dey, Joonhwan Lee, Jodi For...
SIGMOD
2007
ACM
169views Database» more  SIGMOD 2007»
15 years 10 months ago
Genome-scale disk-based suffix tree indexing
With the exponential growth of biological sequence databases, it has become critical to develop effective techniques for storing, querying, and analyzing these massive data. Suffi...
Benjarath Phoophakdee, Mohammed J. Zaki