Sciweavers

1323 search results - page 97 / 265
» Extended Modeling Languages for Interaction Protocol Design
Sort
View
133
Voted
CHI
2009
ACM
16 years 4 months ago
An elementary social information foraging model
User interfaces and information systems have become increasingly social in recent years, aimed at supporting the decentralized, cooperative production and use of content. A theory...
Peter Pirolli
173
Voted
EUROCRYPT
2008
Springer
15 years 5 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith
138
Voted
SEW
2006
IEEE
15 years 9 months ago
Using Views to Specify a Synchronization Aspect for Object-Oriented Languages
It is widely held that programming language extensions that support separation of concerns and that are also integrative benefit development, maintenance and reuse of software de...
R. E. Kurt Stirewalt, Laura K. Dillon, Reimer Behr...
246
Voted

Book
260views
16 years 11 months ago
Java Look and Feel Design Guidelines
"Although an application's human interface designer and software developer might well be the same person, the two jobs involve different tasks and require different skill...
Sun Microsystems Inc
157
Voted
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 10 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs