Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
ACM-SE 47
ACM
 
   
 
Options:
 
  1-6 of 6 reviews Date Reviewed 
  Security metrics for software systems
Wang J., Wang H., Guo M., Xia M.  ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, SC, Mar 19-21, 2009) 1-6, 2009.  Type: Proceedings

Security is a very important software attribute. The ability to quantify software security will definitely help improve the quality and reliability of any type of software. Wang et al. attempt to provide a methodology to calculate soft...

Oct 23 2009
  Unsupervised anomaly detection with minimal sensing
Fine B.  ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, SC, Mar 19-21, 2009) 1-5, 2009.  Type: Proceedings

Remote health monitoring is an emerging discipline with strong potential. It is also a critical application of modern-day networks of wireless sensor nodes--namely, wireless sensor networks (WSNs). For healthcare professionals...

Oct 20 2009
  A secure unidirectional proxy re-encryption using identity and secret key exchange
Milgo E.  ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, South Carolina, Mar 19-21, 2009) 1-5, 2009.  Type: Proceedings

In 1998, Blaze, Bleumer, and Strauss [1] proposed the concept of proxy re-cryptography (PRC), including proxy re-encryption (PRE) and proxy re-signature (PRS). A PRE scheme is a cryptosystem that allows a third party (proxy) to transfo...

Sep 23 2009
  The teaching of immunology using educational: gaming paradigms
Clements P., Pesner J., Shepherd J.  ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, SC, Mar 19-21, 2009) 1-4, 2009.  Type: Proceedings

This paper presents an educational video game developed to teach students about the human immune system. The work is grounded in long-standing principles of educational video game design, and considers an earlier commercial game with a...

Aug 28 2009
  Formal verification of AADL behavior models: a feasibility investigation
Liu H., Gluch D.  ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, SC, Mar 19-21, 2009) 1-6, 2009.  Type: Proceedings

In light of the ubiquity and ever-increasing complexity of real-time embedded systems, the development of a disciplined approach to engineer these often safety-critical and mission-critical systems has become a necessity. The Society o...

Aug 28 2009
  AVARI: animated virtual agent retrieving information
Cairco L., Wilson D., Fowler V., LeBlanc M.  ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, SC, Mar 19-21, 2009) 1-6, 2009.  Type: Proceedings

One of the everlasting dreams of mankind is to build a robot that acts as both friend and assistant, and in such a natural way that human-robot interaction is almost indistinguishable from interaction between humans. This paper describ...

Aug 24 2009
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy