Sciweavers

5326 search results - page 65 / 1066
» On what we can ensure
Sort
View
100
Voted
ISEUD
2009
Springer
15 years 7 months ago
What Is End-User Software Engineering and Why Does It Matter?
End-user programming has become ubiquitous, so much so that there are more end-user programmers today than there are professional programmers. End-user programming empowers—but t...
Margaret M. Burnett
SPW
2000
Springer
15 years 4 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
CHI
2008
ACM
16 years 1 months ago
What to do when search fails: finding information by association
Sometimes people cannot remember the names or locations of things on their computer, but they can remember what other things are associated with them. We created Feldspar, the fir...
Duen Horng Chau, Brad A. Myers, Andrew Faulring
114
Voted
VECPAR
2004
Springer
15 years 6 months ago
PerWiz: A What-If Prediction Tool for Tuning Message Passing Programs
Abstract. This paper presents PerWiz, a performance prediction tool for improving the performance of message passing programs. PerWiz focuses on locating where a significant impro...
Fumihiko Ino, Yuki Kanbe, Masao Okita, Kenichi Hag...
119
Voted
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy
We present the first universally verifiable voting scheme that can be based on a general assumption (existence of a non-interactive commitment scheme). Our scheme is also the first...
Tal Moran, Moni Naor