User profiles for Katy Tarrit

Katy Tarrit

University of Hawaii
Verified email at hawaii.edu
Cited by 176

A catalog of security architecture weaknesses

JCS Santos, K Tarrit, M Mirakhorli - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Secure by design is an approach to developing secure software systems from the ground up.
In such approach, the alternate security tactics are first thought, among them, the best are …

Resolution of impaired multisensory processing in autism and the cost of switching sensory modality

MJ Crosse, JJ Foxe, K Tarrit, EG Freedman… - Communications …, 2022 - nature.com
Children with autism spectrum disorders (ASD) exhibit alterations in multisensory processing,
which may contribute to the prevalence of social and communicative deficits in this …

No evidence for differential saccadic adaptation in children and adults with an autism spectrum diagnosis

K Tarrit, EG Freedman, AA Francisco… - Frontiers in Integrative …, 2023 - frontiersin.org
Background Altered patterns of eye-movements during scene exploration, and atypical gaze
preferences in social settings, have long been noted as features of the Autism phenotype. …

An empirical study of tactical vulnerabilities

JCS Santos, K Tarrit, A Sejfia, M Mirakhorli… - Journal of Systems and …, 2019 - Elsevier
Architectural security tactics (eg, authorization, authentication) are used to achieve
stakeholders’ security requirements. Security tactics allow the system to react, resist, detect and …

Vanishing point detection for visual surveillance systems in railway platform environments

K Tarrit, J Molleda, GA Atkinson, ML Smith… - Computers in …, 2018 - Elsevier
Visual surveillance is of paramount importance in public spaces and especially in train and
metro platforms which are particularly susceptible to many types of crime from petty theft to …

An empirical study on code comprehension: data context interaction compared to classical object oriented

HA Valdecantos, K Tarrit, M Mirakhorli… - 2017 IEEE/ACM 25th …, 2017 - ieeexplore.ieee.org
Source code comprehension affects software development — especially its maintenance —
where code reading is one of the most time-consuming activities. A programming language, …

Impostor Syndrome in Final Year Computer Science Students: An Eye Tracking and Biometrics Study

A Chen, C Wong, K Tarrit, A Peruma - International Conference on Human …, 2024 - Springer
Imposter syndrome is a psychological phenomenon that affects individuals who doubt their
skills and abilities, despite possessing the necessary competencies. This can lead to a lack …

Vanishing point detection for CCTV in railway stations

K Tarrit, GA Atkinson, ML Smith… - … on Imaging for …, 2013 - ieeexplore.ieee.org
Vanishing point (VP) detection is an important task in computer vision with particular
importance in video surveillance. However, despite having numerous applications in camera …

[CITATION][C] An investigation into common challenges of 3D scene understanding in visual surveillance

K Tarrit - 2017 - University of the West of England

[CITATION][C] Saccade Adaptation and Autism Spectrum Disorder

K Tarrit, S Nuvvula, AA Francisco, DJ Horsthuis… - INSAR 2020 Virtual … - insar.confex.com