User profiles for Katy Tarrit
Katy TarritUniversity of Hawaii Verified email at hawaii.edu Cited by 176 |
A catalog of security architecture weaknesses
Secure by design is an approach to developing secure software systems from the ground up.
In such approach, the alternate security tactics are first thought, among them, the best are …
In such approach, the alternate security tactics are first thought, among them, the best are …
Resolution of impaired multisensory processing in autism and the cost of switching sensory modality
Children with autism spectrum disorders (ASD) exhibit alterations in multisensory processing,
which may contribute to the prevalence of social and communicative deficits in this …
which may contribute to the prevalence of social and communicative deficits in this …
No evidence for differential saccadic adaptation in children and adults with an autism spectrum diagnosis
Background Altered patterns of eye-movements during scene exploration, and atypical gaze
preferences in social settings, have long been noted as features of the Autism phenotype. …
preferences in social settings, have long been noted as features of the Autism phenotype. …
An empirical study of tactical vulnerabilities
Architectural security tactics (eg, authorization, authentication) are used to achieve
stakeholders’ security requirements. Security tactics allow the system to react, resist, detect and …
stakeholders’ security requirements. Security tactics allow the system to react, resist, detect and …
Vanishing point detection for visual surveillance systems in railway platform environments
Visual surveillance is of paramount importance in public spaces and especially in train and
metro platforms which are particularly susceptible to many types of crime from petty theft to …
metro platforms which are particularly susceptible to many types of crime from petty theft to …
An empirical study on code comprehension: data context interaction compared to classical object oriented
HA Valdecantos, K Tarrit, M Mirakhorli… - 2017 IEEE/ACM 25th …, 2017 - ieeexplore.ieee.org
Source code comprehension affects software development — especially its maintenance —
where code reading is one of the most time-consuming activities. A programming language, …
where code reading is one of the most time-consuming activities. A programming language, …
Impostor Syndrome in Final Year Computer Science Students: An Eye Tracking and Biometrics Study
Imposter syndrome is a psychological phenomenon that affects individuals who doubt their
skills and abilities, despite possessing the necessary competencies. This can lead to a lack …
skills and abilities, despite possessing the necessary competencies. This can lead to a lack …
Vanishing point detection for CCTV in railway stations
K Tarrit, GA Atkinson, ML Smith… - … on Imaging for …, 2013 - ieeexplore.ieee.org
Vanishing point (VP) detection is an important task in computer vision with particular
importance in video surveillance. However, despite having numerous applications in camera …
importance in video surveillance. However, despite having numerous applications in camera …
[CITATION][C] An investigation into common challenges of 3D scene understanding in visual surveillance
K Tarrit - 2017 - University of the West of England