Sciweavers

14824 search results - page 2930 / 2965
» Security - Introduction
Sort
View
FAC
2007
128views more  FAC 2007»
15 years 13 days ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
GRID
2007
Springer
15 years 13 days ago
Quality of Service Negotiation for Commercial Medical Grid Services
The GEMSS project has developed a service-oriented Grid that supports the provision of medical simulation services by service providers to clients such as hospitals. We outline the...
Stuart E. Middleton, Mike Surridge, Siegfried Benk...
106
Voted
PR
2006
78views more  PR 2006»
15 years 12 days ago
Similarity-based analysis for large networks of ultra-low resolution sensors
By analyzing the similarities between bit streams coming from a network of motion detectors, we can recover the network geometry and discover structure in the human behavior being...
Christopher Richard Wren, David C. Minnen, Sriniva...
87
Voted
SIGCSE
2008
ACM
111views Education» more  SIGCSE 2008»
15 years 12 days ago
Improving computer science diversity through summer camps
Summer camps offer a ripe opportunity for increasing computer science diversity. This panel provides several examples of summer camps that specifically recruit from traditionally ...
Dennis P. Groth, Helen H. Hu, Betty Lauer, Hwajung...
SAC
2006
ACM
15 years 12 days ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
« Prev « First page 2930 / 2965 Last » Next »