Search
w/in this Title
for Titles
All Reviews
ACM-SE 47
ACM
Options:
Date Reviewed
Title
Author
Publisher
Published Date
Descending Order
Ascending Order
1-6 of 6 reviews
Date Reviewed
Security metrics for software systems
Wang J., Wang H., Guo M., Xia M. ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, SC, Mar 19-21, 2009) 1-6, 2009. Type: Proceedings
Security is a very important software attribute. The ability to quantify software security will definitely help improve the quality and reliability of any type of software. Wang et al. attempt to provide a methodology to calculate soft...
Oct 23 2009
Unsupervised anomaly detection with minimal sensing
Fine B. ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, SC, Mar 19-21, 2009) 1-5, 2009. Type: Proceedings
Remote health monitoring is an emerging discipline with strong potential. It is also a critical application of modern-day networks of wireless sensor nodes--namely, wireless sensor networks (WSNs). For healthcare professionals...
Oct 20 2009
A secure unidirectional proxy re-encryption using identity and secret key exchange
Milgo E. ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, South Carolina, Mar 19-21, 2009) 1-5, 2009. Type: Proceedings
In 1998, Blaze, Bleumer, and Strauss [1] proposed the concept of proxy re-cryptography (PRC), including proxy re-encryption (PRE) and proxy re-signature (PRS). A PRE scheme is a cryptosystem that allows a third party (proxy) to transfo...
Sep 23 2009
The teaching of immunology using educational: gaming paradigms
Clements P., Pesner J., Shepherd J. ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, SC, Mar 19-21, 2009) 1-4, 2009. Type: Proceedings
This paper presents an educational video game developed to teach students about the human immune system. The work is grounded in long-standing principles of educational video game design, and considers an earlier commercial game with a...
Aug 28 2009
Formal verification of AADL behavior models: a feasibility investigation
Liu H., Gluch D. ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, SC, Mar 19-21, 2009) 1-6, 2009. Type: Proceedings
In light of the ubiquity and ever-increasing complexity of real-time embedded systems, the development of a disciplined approach to engineer these often safety-critical and mission-critical systems has become a necessity. The Society o...
Aug 28 2009
AVARI: animated virtual agent retrieving information
Cairco L., Wilson D., Fowler V., LeBlanc M. ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, SC, Mar 19-21, 2009) 1-6, 2009. Type: Proceedings
One of the everlasting dreams of mankind is to build a robot that acts as both friend and assistant, and in such a natural way that human-robot interaction is almost indistinguishable from interaction between humans. This paper describ...
Aug 24 2009
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy