Sciweavers

5255 search results - page 366 / 1051
» Formal Methods for Privacy
Sort
View
JELIA
2010
Springer
15 years 2 months ago
Rational Closure for Defeasible Description Logics
In the field of non-monotonic logics, the notion of rational closure is acknowledged as a landmark, and we are going to see that such a construction can be characterised by means o...
Giovanni Casini, Umberto Straccia
HCI
2011
14 years 8 months ago
How Children Can Design the Future
Over the past 15 years, children have become more integrally involved in the design of their technology. In this paper, we present the idea that design partnering methods, specific...
Mona Leigh Guha, Allison Druin, Jerry Alan Fails
IEEEARES
2010
IEEE
15 years 11 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
ACSAC
2005
IEEE
15 years 10 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
AGENTS
2001
Springer
15 years 9 months ago
Terrain coverage with ant robots: a simulation study
In this paper, we study a simple means for coordinating teams of simple agents. In particular, we study ant robots and how they can cover terrain once or repeatedly by leaving mar...
Sven Koenig, Yaxin Liu