Sciweavers

309 search results - page 53 / 62
» Measuring the Effectiveness and the Fairness of Relation Hid...
Sort
View
ACSAC
2009
IEEE
15 years 6 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
IOLTS
2005
IEEE
163views Hardware» more  IOLTS 2005»
15 years 5 months ago
Modeling Soft-Error Susceptibility for IP Blocks
As device geometries continue to shrink, single event upsets are becoming of concern to a wider spectrum of system designers. These “soft errors” can be a nuisance or catastro...
Robert C. Aitken, Betina Hold
JUCS
2011
153views more  JUCS 2011»
14 years 2 months ago
A Framework to Evaluate Interface Suitability for a Given Scenario of Textual Information Retrieval
: Visualization of search results is an essential step in the textual Information Retrieval (IR) process. Indeed, Information Retrieval Interfaces (IRIs) are used as a link between...
Nicolas Bonnel, Max Chevalier, Claude Chrisment, G...
ATAL
2007
Springer
15 years 5 months ago
Empirical game-theoretic analysis of the TAC Supply Chain game
The TAC Supply Chain Management (TAC/SCM) game presents a challenging dynamic environment for autonomous decision-making in a salient application domain. Strategic interactions co...
Patrick R. Jordan, Christopher Kiekintveld, Michae...
CN
2008
108views more  CN 2008»
14 years 10 months ago
An approach to the identification of network elements composing heterogeneous end-to-end paths
Today's networks are becoming increasingly complex and the ability to effectively and efficiently operate and manage them is ever more challenging. Ways to provide end-to-end...
Alessio Botta, Antonio Pescapè, Giorgio Ven...