Sciweavers

903 search results - page 80 / 181
» Usability inspection methods
Sort
View
APSEC
2002
IEEE
15 years 3 months ago
Has Twenty-five Years of Empirical Software Engineering Made a Difference?
Our activities in software engineering typically fall into one of three categories, (1) to invent new phenomena, (2) to understand existing phenomena, and (3) to facilitate inspir...
D. Ross Jeffery, Louise Scott
IV
2002
IEEE
114views Visualization» more  IV 2002»
15 years 3 months ago
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Tetsuji Takada, Hideki Koike
ACISP
1998
Springer
15 years 2 months ago
Detecting Key-Dependencies
The confidentiality of encrypted data depends on how well the key under which it was encrypted is maintained. If a session key was exchanged encrypted under a long-term key, exposu...
Tage Stabell-Kulø, Arne Helme, Gianluca Din...
ECBS
1997
IEEE
144views Hardware» more  ECBS 1997»
15 years 2 months ago
An analysis of the Ariane 5 flight 501 failure-a system engineering perspective
The report issued by the Inquiry Board in charge of inspecting the Ariane 5 flight 501 failure concludes that causes of the failure are rooted into poor S/W Engineering practice. ...
Gérard Le Lann
3DIM
2001
IEEE
15 years 2 months ago
Reliable 3D Surface Acquisition, Registration and Validation Using Statistical Error Models
We present a complete data acquisition and processing chain for the reliable inspection of industrial parts considering anisotropic noise. Data acquisition is performed with a str...
Jens Guehring