Sciweavers

519 search results - page 73 / 104
» How to make secure email easier to use
Sort
View
SIGMOD
2009
ACM
140views Database» more  SIGMOD 2009»
15 years 10 months ago
Estimating the confidence of conditional functional dependencies
Conditional functional dependencies (CFDs) have recently been proposed as extensions of classical functional dependencies that apply to a certain subset of the relation, as specif...
Graham Cormode, Lukasz Golab, Flip Korn, Andrew Mc...
FPGA
2003
ACM
156views FPGA» more  FPGA 2003»
15 years 2 months ago
Architectures and algorithms for synthesizable embedded programmable logic cores
As integrated circuits become more and more complex, the ability to make post-fabrication changes will become more and more attractive. This ability can be realized using programm...
Noha Kafafi, Kimberly Bozman, Steven J. E. Wilton
CCS
2006
ACM
15 years 1 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
15 years 10 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
COREGRID
2007
Springer
15 years 3 months ago
Adding metadata to Orc to support reasoning about grid programs
Abstract Following earlier work demonstrating the utility of Orc as a means of specifying and reasoning about grid applications we propose the enhancement of such specifications w...
Marco Aldinucci, Marco Danelutto, Peter Kilpatrick