Sciweavers

539 search results - page 89 / 108
» The N R One Time Password System
Sort
View
ACSAC
2003
IEEE
15 years 3 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
ECIS
2003
14 years 11 months ago
Universality thesis in IS ethics education - an empirical study
The explosion in the use of computers has strengthened the need to address ethical issues in information systems (IS) education. As a result, several IS ethics education framework...
Tero Vartiainen, Mikko T. Siponen
81
Voted
VC
2008
131views more  VC 2008»
14 years 9 months ago
Motion synthesis with decoupled parameterization
In real-time animation systems, motion interpolation techniques are widely used for their controllability and efficiency. The techniques sample the parameter space using example mo...
Dongwook Ha, JungHyun Han
SIGMETRICS
2005
ACM
150views Hardware» more  SIGMETRICS 2005»
15 years 3 months ago
An analytical model for multi-tier internet services and its applications
- Since many Web applications employ a multi-tier architecture, in this paper, we focus on the problem of analytically modeling the behavior of such applications. We present a mode...
Bhuvan Urgaonkar, Giovanni Pacifici, Prashant J. S...
AAECC
2003
Springer
139views Algorithms» more  AAECC 2003»
15 years 2 months ago
Fighting Two Pirates
A pirate is a person who buys a legal copy of a copyrighted work and who reproduces it to sell illegal copies. Artists and authors are worried as they do not get the income which i...
Hans Georg Schaathun