Sciweavers

84 search results - page 11 / 17
» assets 2010
Sort
View
ACSAC
2010
IEEE
14 years 8 months ago
Two methodologies for physical penetration testing using social engineering
Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
WEBI
2010
Springer
14 years 7 months ago
Integrating Provenance Information in Reservoir Engineering
Data management and analysis has become an integral component in the area of reservoir engineering. An important metric that determines the overall effectiveness of data analysis i...
Jing Zhao, Na Chen, Karthik Gomadam, Viktor K. Pra...
WOA
2010
14 years 7 months ago
An Agent-based System for Maritime Search and Rescue Operations
Maritime search and rescue operations are critical missions involving personnel, boats, helicopter, aircrafts in a struggle against time often worsened by adversary sea and weather...
Salvatore Aronica, Francesco Benvegna, Massimo Cos...
ASSETS
2010
ACM
14 years 4 months ago
Broadening accessibility through special interests: a new approach for software customization
Individuals diagnosed with autism spectrum disorder (ASD) often fixate on narrow, restricted interests. These interests can be highly motivating, but they can also create attentio...
Robert R. Morris, Connor R. Kirschbaum, Rosalind W...
ASSETS
2010
ACM
14 years 10 months ago
A web-based user survey for evaluating power saving strategies for deaf users of mobileASL
MobileASL is a video compression project for two-way, real-time video communication on cell phones, allowing Deaf people to communicate in the language most accessible to them, Am...
Jessica J. Tran, Tressa W. Johnson, Joy Kim, Rafae...