Sciweavers

14054 search results - page 2658 / 2811
» P
Sort
View
ASIACRYPT
2008
Springer
15 years 7 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
ASPDAC
2008
ACM
101views Hardware» more  ASPDAC 2008»
15 years 7 months ago
Interconnect modeling for improved system-level design optimization
Accurate modeling of delay, power, and area of interconnections early in the design phase is crucial for effective system-level optimization. Models presently used in system-level...
Luca P. Carloni, Andrew B. Kahng, Swamy Muddu, Ale...
ASSETS
2008
ACM
15 years 7 months ago
What's new?: making web page updates accessible
Web applications facilitated by technologies such as JavaScript, DHTML, AJAX, and Flash use a considerable amount of dynamic web content that is either inaccessible or unusable by...
Yevgen Borodin, Jeffrey P. Bigham, Rohit Raman, I....
ASSETS
2008
ACM
15 years 7 months ago
Accessibility commons: a metadata infrastructure for web accessibility
Research projects, assistive technology, and individuals all create metadata in order to improve Web accessibility for visually impaired users. However, since these projects are d...
Shinya Kawanaka, Yevgen Borodin, Jeffrey P. Bigham...
ASSETS
2008
ACM
15 years 7 months ago
Hunting for headings: sighted labeling vs. automatic classification of headings
Proper use of headings in web pages can make navigation more efficient for blind web users by indicating semantic di visions in the page. Unfortunately, many web pages do not use ...
Jeremy T. Brudvik, Jeffrey P. Bigham, Anna Cavende...
« Prev « First page 2658 / 2811 Last » Next »