Sciweavers

5722 search results - page 175 / 1145
» Security Function Interactions
Sort
View
97
Voted
AAAI
2000
15 years 2 months ago
Adaptive User Interfaces through Dynamic Design Automation
The inherent difficulty in supporting human usability in large control systems--such as building environmental and security systems--derives from the large diversity of components...
Robin R. Penner, Erik S. Steinmetz, Christopher L....
81
Voted
CSCW
2002
ACM
15 years 16 days ago
Creating assemblies: : aboard the Ghost Ship
This paper examines the use of an interactive artwork that was designed by members of the research team and exhibited at the Sculpture, Objects and Functional Art (SOFA) Expositio...
Jon Hindmarsh, Christian Heath, Dirk vom Lehn, Jas...
101
Voted
CRYPTO
1991
Springer
105views Cryptology» more  CRYPTO 1991»
15 years 4 months ago
Universal Hashing and Authentication Codes
In this paper, we study the application of universal hashingto the construction of unconditionally secure authentication codes without secrecy. This idea is most useful when the nu...
Douglas R. Stinson
102
Voted
ASM
2004
ASM
15 years 6 months ago
Intra-step Interaction
For a while it seemed possible to pretend that all interaction between an algorithm and its environment occurs inter-step, but not anymore. Andreas Blass, Benjamin Rossman and the ...
Yuri Gurevich
119
Voted
BMCBI
2006
157views more  BMCBI 2006»
15 years 23 days ago
Comparison of protein interaction networks reveals species conservation and divergence
Background: Recent progresses in high-throughput proteomics have provided us with a first chance to characterize protein interaction networks (PINs), but also raised new challenge...
Zhi Liang, Meng Xu, Maikun Teng, Liwen Niu