Sciweavers

2236 search results - page 310 / 448
» Secure Software Design in Practice
Sort
View
ASSETS
2007
ACM
15 years 1 months ago
Simulation to predict performance of assistive interfaces
Computers offer valuable assistance to people with physical disabilities. However designing human-computer interfaces for these users is complicated. The range of abilities is mor...
Pradipta Biswas, Peter Robinson
EUROMED
2010
14 years 8 months ago
Automated Processing of Data from 3D Scanning of Cultural Heritage Objects
Abstract. In this paper, the concept of computational environment for processing of very large datasets (clouds of points with amount up to 1011 measurement points) obtained from 3...
Robert Sitnik, Maciej Karaszewski
CLEIEJ
2010
14 years 7 months ago
Professional Training Program Management through Holonic Networks
Holonic networks constitute a type of organizational structures widely used at manufacturing enterprises. In an educational context, however, this type of structures remains practi...
Jonas Montilva C., Milagro Rivero, Judith Barrios ...
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
15 years 4 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...
CCS
2010
ACM
14 years 10 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...