Sciweavers

6770 search results - page 409 / 1354
» How GPUs Work
Sort
View
ICITS
2009
15 years 2 months ago
Cryptanalysis of Secure Message Transmission Protocols with Feedback
In the context of secure point-to-point message transmission in networks with minimal connectivity, previous studies showed that feedbacks from the receiver to the sender can be us...
Qiushi Yang, Yvo Desmedt
IJISEC
2010
159views more  IJISEC 2010»
15 years 2 months ago
A generalization of Paillier's public-key system with applications to electronic voting
We propose a generalization of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme e...
Ivan Damgård, Mads Jurik, Jesper Buus Nielse...
CSCW
2011
ACM
14 years 11 months ago
Peer interaction effectively, yet infrequently, enables programmers to discover new tools
Computer users rely on software tools to work effectively and efficiently, but it is difficult for users to be aware of all the tools that might be useful to them. While there a...
Emerson R. Murphy-Hill, Gail C. Murphy
CSCW
2011
ACM
14 years 11 months ago
Faceted identity, faceted lives: social and technical issues with being yourself online
This paper explores key issues people experience managing personal boundaries within and across social technologies. We look in particular at email and online social networks. We ...
Shelly Farnham, Elizabeth F. Churchill
ECEASST
2011
241views ECommerce» more  ECEASST 2011»
14 years 11 months ago
Concurrent Workflow Evolution
Workflow evolution is a collective term for concepts that deal with changes of workflow models. Adapted workflow models are deployed on a workflow engine as new model version. That...
Mirko Sonntag, Dimka Karastoyanova