Человеко-машинное взаимодействие. Человеко-машинный интерфейс. Пользовательский интерфейс. Операционная среда пользователя - 004.5

Научные статьи

В разделе "Человеко-машинное взаимодействие. Человеко-машинный интерфейс. Пользовательский интерфейс. Операционная среда пользователя"
A Model of a Generic Natural Language Interface for Querying Database
Modeling Uncertainty in Ontologies using Rough Set
Accelerating Activation Function for 3-Satisfiability Logic Programming
Hybrid Algorithm Based on Swarm Intelligence Techniques for Dynamic Tasks Scheduling in Cloud Computing
A Review on Large Scale Graph Processing Using Big Data Based Parallel Programming Models
A Hybrid Artificial Bee Colony and Harmony Search Algorithm to Generate Covering Arrays for Pair-wise Testing
Using P systems to Solve the Discrete Logarithm Problem used in Diffie-Hellman Key Exchange Protocol
Code Formal Verification of Operation System
A new Immunity Intrusion Detection Model Based on Genetic Algorithm and Vaccine Mechanism
A Method of Hash Join in the DAS Model
A Model of Workflow-oriented Attributed Based Access Control
Design and Implementation for Malicious Links Detection System Based On Security Relevance of Webpage Script Text
Layered Design and Collaborative Development of Network System and Its Application in Real-time Information Cluster
Toward Security Test Automation for Event Driven GUI Web Contents
Routers Sequential Comparing Two Sample Packets for Dropping Worms
Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems
Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals
The Design and Development of Real-Time E-Voting System in Nigeria with Emphasis on Security and Result Veracity
Enhancing the Discrete Particle Swarm Optimization based Workflow Grid Scheduling using Hierarchical Structure
Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers
Information Leakage Prevention Using Virtual Disk Drive
Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review
Comparative Performance Analysis of AODV and AODV-MIMC Routing Protocols for Mobile Ad hoc Networks
Trust Metric based Soft Security in Mobile Pervasive Environment
An Improved Trusted Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Detection Block Model for SQL Injection Attacks
An Architecture for Alert Correlation Inspired By a Comprehensive Model of Human Immune System
Controlling Information Flows in Net Services with Low Runtime Overhead
Innovative Method for Enhancing Key Generation and Management in the AES-Algorithm
Secure Allocation of Resources in Cloud Using Trust
Context-Sensitive Grammars and Linear-Bounded Automata
Dynamic Fair Priority Optimization Task Scheduling Algorithm in Cloud Computing: Concepts and Implementations
A System Call Randomization Based Method for Countering Code-Injection Attacks
Realization of Efficient High Throughput Buffering Policies for Network on Chip Router
Trusted Mobile Client for Document Security in Mobile Office Automation
A Semantic Approach to the Notion of Representation and Its Application to Information Systems
Architecture for Accessing Heterogeneous Databases
Using Logic Programming to Represent Information Content Inclusion Relations
Using Fuzzy Logic to Evaluate Normalization Completeness for an Improved Database Design
Implementing SEReleC with EGG