Sciweavers

1770 search results - page 173 / 354
» Writing requirements in computer security
Sort
View
70
Voted
ICPR
2002
IEEE
15 years 11 months ago
Automatic Grading Prototype System for KANJI Dictation Test
This paper presents an automatic grading prototype system developed as recognition engine for Japanese KANJI Dictation Test which aims to certificate the reading and writing abili...
Meng Shi, Tetsushi Wakabayashi, Wataru Ohyama, Fum...
72
Voted
CHI
2004
ACM
15 years 10 months ago
Privacy policies as decision-making tools: an evaluation of online privacy notices
Studies have repeatedly shown that users are increasingly concerned about their privacy when they go online. In response to both public interest and regulatory pressures, privacy ...
Carlos Jensen, Colin Potts
SAC
2009
ACM
15 years 5 months ago
Specifying and checking protocols of multithreaded classes
In the Design By Contract (DBC) approach, programmers specify methods with pre and postconditions (also called contracts). Earlier work added protocols to the DBC approach to desc...
Clément Hurlin
96
Voted
ISEUD
2009
Springer
15 years 4 months ago
Fast, Accurate Creation of Data Validation Formats by End-User Developers
Abstract. Inputs to web forms often contain typos or other errors. However, existing web form design tools require end-user developers to write regular expressions (“regexps”) ...
Christopher Scaffidi, Brad A. Myers, Mary Shaw
82
Voted
ACMSE
2009
ACM
15 years 4 months ago
FI-based file access predictor
An algorithm is proposed for the purpose of optimizing the availability of files to an operating system prior to their being required during execution by a running system. This al...
Jinsuk Baek, Paul S. Fisher, Mingyung Kwak