Человеко-машинное взаимодействие. Человеко-машинный интерфейс. Пользовательский интерфейс. Операционная среда пользователя - 004.5

Научные статьи

В разделе "Человеко-машинное взаимодействие. Человеко-машинный интерфейс. Пользовательский интерфейс. Операционная среда пользователя"
A Model for Object-Oriented Software Maintainability Measurement
Morteza Asadi, Hassan Rashidi
A Model of a Generic Natural Language Interface for Querying Database
Hanane Bais, Mustapha Machkour, Lahcen Koutti
Modeling Uncertainty in Ontologies using Rough Set
Armand F. Donfack Kana, Babatunde O. Akinkunmi
Accelerating Activation Function for 3-Satisfiability Logic Programming
Mohd Asyraf Mansor, Saratha Sathasivam
Hybrid Algorithm Based on Swarm Intelligence Techniques for Dynamic Tasks Scheduling in Cloud Computing
Medhat A. Tawfeek, Gamal F. Elhady
A Review on Large Scale Graph Processing Using Big Data Based Parallel Programming Models
Anuraj Mohan, Remya G
A Hybrid Artificial Bee Colony and Harmony Search Algorithm to Generate Covering Arrays for Pair-wise Testing
Priti Bansal, Sangeeta Sabharwal, Nitish Mittal
Using P systems to Solve the Discrete Logarithm Problem used in Diffie-Hellman Key Exchange Protocol
Xiaojing Ma, Zhitang Li, Hao Tu
Code Formal Verification of Operation System
Yu Zhang, Yunwei Dong, Huo Hong, Fan Zhang
A new Immunity Intrusion Detection Model Based on Genetic Algorithm and Vaccine Mechanism
Jing Xiao-Pei, Wang Hou-Xiang
A Method of Hash Join in the DAS Model
Ma Sha, Yang Bo, Li Kangshun
A Model of Workflow-oriented Attributed Based Access Control
Guoping Zhang, Jing Liu
Design and Implementation for Malicious Links Detection System Based On Security Relevance of Webpage Script Text
Xing Rong, Li Jun, Jing Tao
Layered Design and Collaborative Development of Network System and Its Application in Real-time Information Cluster
Qiudong Sun, Wenxin Ma, Yongping Qiu, Wei Chen
Toward Security Test Automation for Event Driven GUI Web Contents
Izzat Alsmadi, Ahmed AlEroud
Routers Sequential Comparing Two Sample Packets for Dropping Worms
Kannaiyaraja, Babu, Senthamaraiselvan, Arulandam
Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems
Zahra Atashbar Orang, Ezzat Moradpour, Ahmad Habibizad Navin, Amir Azimi Alasti Ahrabim, Mir Kamal Mirnia
Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals
Zhukov Igor, Mikhaylov Dmitry, Starikovskiy Andrey, Kuznetsov Dmitry, Tolstaya Anastasia, Zuykov Alexander
The Design and Development of Real-Time E-Voting System in Nigeria with Emphasis on Security and Result Veracity
Shafi'í Muhammad Abdulhamid, Olawale Surajudeen Adebayo, Damian Oshomah Ugiomoh, Mohammed Danlami AbdulMalik
Enhancing the Discrete Particle Swarm Optimization based Workflow Grid Scheduling using Hierarchical Structure
Ritu Garg, Awadhesh Kumar Singh
Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers
P. Mabin Joseph, J. Rajan, K.K. Kuriakose, S.A.V. Satya Murty
Information Leakage Prevention Using Virtual Disk Drive
Tarek S. Sobh
Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review
Sumit Goyal
Comparative Performance Analysis of AODV and AODV-MIMC Routing Protocols for Mobile Ad hoc Networks
P.Periyasamy, E.Karthikeyan
Trust Metric based Soft Security in Mobile Pervasive Environment
Madhu Sharma Gaur, Bhaskar Pant
An Improved Trusted Greedy Perimeter Stateless Routing for Wireless Sensor Networks
P. Raghu Vamsi, Krishna Kant
Detection Block Model for SQL Injection Attacks
Diksha G. Kumar, Madhumita Chatterjee
An Architecture for Alert Correlation Inspired By a Comprehensive Model of Human Immune System
Mehdi Bateni, Ahmad Baraani
Controlling Information Flows in Net Services with Low Runtime Overhead
Shih-Chien Chou
Innovative Method for Enhancing Key Generation and Management in the AES-Algorithm
Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem
Secure Allocation of Resources in Cloud Using Trust
Usha Divakarla, K. Chandrasekaran
Context-Sensitive Grammars and Linear-Bounded Automata
Prem Nath
Dynamic Fair Priority Optimization Task Scheduling Algorithm in Cloud Computing: Concepts and Implementations
Deepika Saxena, R.K. Chauhan, Ramesh Kait
A System Call Randomization Based Method for Countering Code-Injection Attacks
Zhaohui Liang, Bin Liang, Lupin Li
Realization of Efficient High Throughput Buffering Policies for Network on Chip Router
Liyaqat Nazir, Roohie Naaz Mir
Trusted Mobile Client for Document Security in Mobile Office Automation
Xiaojun Yu, Qiaoyan Wen
A Semantic Approach to the Notion of Representation and Its Application to Information Systems
Lin Liu, Junkang Feng
Architecture for Accessing Heterogeneous Databases
Mohd Kamir Yusof, Ahmad Faisal Amri Abidin, Mohd Nordin Abdul Rahman
Using Logic Programming to Represent Information Content Inclusion Relations
Doug Salt, Junkang Feng
Using Fuzzy Logic to Evaluate Normalization Completeness for an Improved Database Design
M. Rizwan Jameel Qureshi, Mahaboob Sharief Shaik, Nayyar Iqbal