Sciweavers

5722 search results - page 152 / 1145
» Security Function Interactions
Sort
View
93
Voted
CCS
2007
ACM
15 years 6 months ago
An algorithm for the appraisal of assurance indicators for complex business processes
In order to provide certified security services we must provide indicators that can measure the level of assurance that a complex business process can offer. Unfortunately the fo...
Fabio Massacci, Artsiom Yautsiukhin
PKC
2007
Springer
111views Cryptology» more  PKC 2007»
15 years 6 months ago
Optimistic Fair Exchange in a Multi-user Setting
: This paper addresses the security of optimistic fair exchange in a multi-user setting. While the security of public key encryption and public key signature schemes in a single-us...
Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
CHI
2011
ACM
14 years 4 months ago
Snaplet: using body shape to inform function in mobile flexible display devices
With recent advances in flexible displays, computer displays are no longer restricted to flat, rigid form factors. In this paper, we propose that the physical form of a flexible d...
Aneesh P. Tarun, Byron Lahey, Audrey Girouard, Win...
100
Voted
SIGMOD
2011
ACM
234views Database» more  SIGMOD 2011»
14 years 3 months ago
Ranking with uncertain scoring functions: semantics and sensitivity measures
Ranking queries report the top-K results according to a user-defined scoring function. A widely used scoring function is the weighted summation of multiple scores. Often times, u...
Mohamed A. Soliman, Ihab F. Ilyas, Davide Martinen...
124
Voted
DILS
2009
Springer
15 years 7 months ago
Integration of Full-Coverage Probabilistic Functional Networks with Relevance to Specific Biological Processes
Probabilistic functional integrated networks are powerful tools with which to draw inferences from high-throughput data. However, network analyses are generally not tailored to spe...
Katherine James, Anil Wipat, Jennifer Hallinan