Sciweavers

2338 search results - page 256 / 468
» Community computing and the computing community
Sort
View
CCS
2009
ACM
15 years 1 months ago
RFID privacy: relation between two notions, minimal condition, and efficient construction
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions: one based on the indistinguishability of t...
Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li
148
Voted
DAC
2011
ACM
14 years 3 months ago
Process-level virtualization for runtime adaptation of embedded software
Modern processor architectures call for software that is highly tuned to an unpredictable operating environment. Processlevel virtualization systems allow existing software to ada...
Kim M. Hazelwood
143
Voted
HUC
2011
Springer
14 years 3 months ago
The social fMRI: measuring, understanding, and designing social mechanisms in the real world
A key challenge of data-driven social science is the gathering of high quality multi-dimensional datasets. A second challenge relates to design and execution of structured experim...
Nadav Aharony, Wei Pan, Cory Ip, Inas Khayal, Alex...
STACS
2010
Springer
15 years 10 months ago
Mathematics, Cryptology, Security
Abstract. In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and H...
Jacques Stern
109
Voted
ECOOP
2006
Springer
15 years 7 months ago
Demeter Interfaces: Adaptive Programming Without Surprises
Adaptive Programming (AP) allows for the separate definition of data structures and traversals with attached computations, performed during the traversal, that operate on these dat...
Therapon Skotiniotis, Jeffrey Palm, Karl J. Lieber...