Sciweavers

562 search results - page 61 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
SAC
2004
ACM
15 years 9 months ago
Axes-based visualizations with radial layouts
In the analysis of multidimensional data sets questions involving detection of extremal events, correlations, patterns and trends play an increasingly important role in a variety ...
Christian Tominski, James Abello, Heidrun Schumann
128
Voted
CHI
2010
ACM
15 years 10 months ago
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Alain Forget, Sonia Chiasson, Robert Biddle
ACMACE
2008
ACM
15 years 6 months ago
BeatBender: subsumption architecture for autonomous rhythm generation
BeatBender is a computer music project that explores a new method for generating emergent rhythmic drum patterns using the subsumption architecture. Rather than explicitly coding ...
Aaron Levisohn, Philippe Pasquier
SOUPS
2009
ACM
15 years 10 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
157
Voted
LICS
2007
IEEE
15 years 10 months ago
A Complete Axiomatization of Knowledge and Cryptography
The combination of first-order epistemic logic and formal cryptography offers a potentially very powerful framework for security protocol verification. In this article, we addre...
Mika Cohen, Mads Dam