Sciweavers

3829 search results - page 25 / 766
» Improving Our Reviewing Processes
Sort
View
CCS
2006
ACM
15 years 1 months ago
Searchable symmetric encryption: improved definitions and efficient constructions
Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to another party in a private manner, while maintaining the ability to selectively search...
Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail ...
JLP
2007
114views more  JLP 2007»
14 years 9 months ago
Deaccumulation techniques for improving provability
Several induction theorem provers were developed to verify functional programs mechanically. Unfortunately, automatic verification often fails for functions with accumulating arg...
Jürgen Giesl, Armin Kühnemann, Janis Voi...
PUC
2002
69views more  PUC 2002»
14 years 9 months ago
The Well Mannered Wearable Computer
: In this paper we describe continuing work being carried out as part of the Bristol Wearable Computing Initiative. We are interested in the use of context sensors to improve the u...
Cliff Randell, Henk L. Muller
AAAI
1994
14 years 11 months ago
A Prototype Reading Coach that Listens
ing with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. The following notice...
Jack Mostow, Steven F. Roth, Alexander G. Hauptman...
NDSS
2005
IEEE
15 years 3 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell