Sciweavers

562 search results - page 60 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
SIGIR
2011
ACM
14 years 6 months ago
ViewSer: enabling large-scale remote user studies of web search examination and interaction
Web search behaviour studies, including eye-tracking studies of search result examination, have resulted in numerous insights to improve search result quality and presentation. Ye...
Dmitry Lagun, Eugene Agichtein
132
Voted
ISWC
2003
IEEE
15 years 9 months ago
Peer-to-Peer Policy Management System for Wearable Mobile Devices
Wearable computing devices are obviously made all the more powerful due to their ability to be innately mobile. With this in mind, spontaneous peer-to-peer networks may emerge amo...
Michael Massimi, Ursula Wolz
FASE
2008
Springer
15 years 5 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
150
Voted
WISTP
2010
Springer
15 years 11 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
136
Voted
ANCS
2006
ACM
15 years 7 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo