Sciweavers

557 search results - page 83 / 112
» Two experiences designing for effective security
Sort
View
COMCOM
2008
135views more  COMCOM 2008»
14 years 11 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan
IJMMS
2006
103views more  IJMMS 2006»
14 years 12 months ago
Cultural differences on attention and perceived usability: Investigating color combinations of animated graphics
This experimental study investigates the effects of animated graphic colors on attention and perceived usability of users from two cultural groups, American and Thai. The experime...
Jantawan Noiwan, Anthony F. Norcio
WWW
2002
ACM
16 years 17 days ago
Visualizing web site comparisons
The Web is increasingly becoming an important channel for conducting businesses, disseminating information, and communicating with people on a global scale. More and more companie...
Bing Liu, Kaidi Zhao, Lan Yi
VSTTE
2010
Springer
14 years 9 months ago
Towards Scalable Modular Checking of User-Defined Properties
Abstract. Theorem-prover based modular checkers have the potential to perform scalable and precise checking of user-defined properties by combining pathsensitive intraprocedural re...
Thomas Ball, Brian Hackett, Shuvendu K. Lahiri, Sh...
SENSYS
2009
ACM
15 years 6 months ago
Achieving range-free localization beyond connectivity
Wireless sensor networks have been proposed for many location-dependent applications. In such applications, the requirement of low system cost prohibits many range-based methods f...
Ziguo Zhong, Tian He