Sciweavers

527 search results - page 105 / 106
» Professional software Engineering Education
Sort
View
TISSEC
2010
237views more  TISSEC 2010»
12 years 11 months ago
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
CHI
2006
ACM
14 years 5 months ago
Tabletop sharing of digital photographs for the elderly
We have recently begun to see hardware support for the tabletop user interface, offering a number of new ways for humans to interact with computers. Tabletops offer great potentia...
Trent Apted, Judy Kay, Aaron J. Quigley
GSEM
2004
Springer
13 years 10 months ago
The Grid-Occam Project
Occam is a parallel processing language designed by a team at INMOS in conjunction with the design of the transputer processor, and based on Sir T. Hoare's ideas of Communica...
Peter Tröger, Martin von Löwis, Andreas ...
SBIA
1995
Springer
13 years 8 months ago
Modeling the Influence of Non-Changing Quantities
ion Framework for Compositional Modeling 36 Diane Chi and Yumi Iwasaki Model Decomposition and Simulation 45 Daniel J. Clancy and Benjamin Kuipers A Distance Measure for Attention ...
Bert Bredeweg, Kees de Koning, Cis Schut
CCS
2008
ACM
13 years 7 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung