Sciweavers

562 search results - page 78 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
ICPP
2008
IEEE
15 years 10 months ago
Overcoming Scalability Challenges for Tool Daemon Launching
: Many tools that target parallel and distributed environments must co-locate a set of daemons with the distributed processes of the target application. However, efficient and por...
Dong H. Ahn, Dorian C. Arnold, Bronis R. de Supins...
128
Voted
SAC
2010
ACM
15 years 10 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
AUTOMOTIVEUI
2009
ACM
15 years 8 months ago
In-vehicle technology functional requirements for older drivers
Older drivers represent the fastest growing segment of the road user population. Cognitive and physiological capabilities diminishes with ages. The design of future in-vehicle int...
Andry Rakotonirainy, Dale Steinhardt
145
Voted
MMSYS
2012
242views more  MMSYS 2012»
13 years 11 months ago
6DMG: a new 6D motion gesture database
Motion-based control is gaining popularity, and motion gestures form a complementary modality in human-computer interactions. To achieve more robust user-independent motion gestur...
Mingyu Chen, Ghassan Al-Regib, Biing-Hwang Juang
111
Voted
CHI
2009
ACM
16 years 4 months ago
A comprehensive study of frequency, interference, and training of multiple graphical passwords
Graphical password systems have received significant attention as one potential solution to the need for more usable authentication, but nearly all prior work makes the unrealisti...
Katherine Everitt, Tanya Bragin, James Fogarty, Ta...