Sciweavers

728 search results - page 71 / 146
» New Directions in Question Answering
Sort
View
78
Voted
NORDICHI
2006
ACM
15 years 7 months ago
How HCI-practitioners want to evaluate their own practice
How do individual HCI-practitioners evaluate their own work practice? And how would they like to evaluate it? Answers to these questions will give new knowledge on the state-of-th...
Asbjørn Følstad, Ida Bark, Jan Gulli...
ASIACRYPT
2009
Springer
15 years 8 months ago
Cascade Encryption Revisited
Abstract. The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that dou...
Peter Gazi, Ueli M. Maurer
ICPP
2007
IEEE
15 years 7 months ago
SOR: A Static File Assignment Strategy Immune to Workload Characteristic Assumptions in Parallel I/O Systems
The problem of statically assigning nonpartitioned files in a parallel I/O system has been extensively investigated. A basic workload characteristic assumption of existing solutio...
Tao Xie 0004
FC
2007
Springer
136views Cryptology» more  FC 2007»
15 years 7 months ago
Usability Analysis of Secure Pairing Methods
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electroni...
Ersin Uzun, Kristiina Karvonen, N. Asokan
CCS
2010
ACM
15 years 4 months ago
Scene tagging: image-based CAPTCHA using image composition and object relationships
In this paper, we propose a new form of image-based CAPTCHA we term "scene tagging". It tests the ability to recognize a relationship between multiple objects in an imag...
Peter Matthews, Cliff Changchun Zou