Sciweavers

3686 search results - page 450 / 738
» Comprehensive comprehensions
Sort
View
EUROCRYPT
2010
Springer
15 years 8 months ago
Cryptographic Agility and Its Relation to Circular Encryption
We initiate a provable-security treatment of cryptographic agility. A primitive (for example PRFs, authenticated encryption schemes or digital signatures) is agile when multiple, ...
Tolga Acar, Mira Belenkiy, Mihir Bellare, David Ca...
ICSE
2010
IEEE-ACM
15 years 8 months ago
Developers ask reachability questions
A reachability question is a search across feasible paths through a program for target statements matching search criteria. In three separate studies, we found that reachability q...
Thomas D. LaToza, Brad A. Myers
PAKDD
2010
ACM
167views Data Mining» more  PAKDD 2010»
15 years 8 months ago
Hierarchical Web-Page Clustering via In-Page and Cross-Page Link Structures
Abstract. Despite of the wide diversity of web-pages, web-pages residing in a particular organization, in most cases, are organized with semantically hierarchic structures. For exa...
Cindy Xide Lin, Yintao Yu, Jiawei Han, Bing Liu
CDC
2009
IEEE
101views Control Systems» more  CDC 2009»
15 years 8 months ago
Barrier function nonlinear optimization for optimal Decompression of divers
— This paper is based on a comprehensive dynamic mathematical model (Copernicus) of vascular bubble formation and growth during and after decompression from a dive. The model des...
Le Feng, Christian R. Gutvik, Tor Arne Johansen, D...
AUTOMOTIVEUI
2009
ACM
15 years 8 months ago
In-vehicle technology functional requirements for older drivers
Older drivers represent the fastest growing segment of the road user population. Cognitive and physiological capabilities diminishes with ages. The design of future in-vehicle int...
Andry Rakotonirainy, Dale Steinhardt