Sciweavers

5722 search results - page 186 / 1145
» Security Function Interactions
Sort
View
98
Voted
ICML
2000
IEEE
16 years 1 months ago
Learning Subjective Functions with Large Margins
In manyoptimization and decision problems the objective function can be expressed as a linear combinationof competingcriteria, the weights of whichspecify the relative importanceo...
Claude-Nicolas Fiechter, Seth Rogers
85
Voted
VL
2009
IEEE
156views Visual Languages» more  VL 2009»
15 years 7 months ago
Non-programmers identifying functionality in unfamiliar code: Strategies and barriers
Source code on the web is a widely available and potentially rich learning resource for nonprogrammers. However, unfamiliar code can be daunting to end-users without programming e...
Paul A. Gross, Caitlin Kelleher
ACMDIS
2004
ACM
15 years 6 months ago
Communication functions and the adaptation of design representations in interdisciplinary teams
Design representations in user-centered design serve intentions for directing design process and communication functions for enlisting interdisciplinary participation. To disentan...
David G. Hendry
DEXAW
2009
IEEE
124views Database» more  DEXAW 2009»
15 years 7 months ago
Performance Comparison of Secure Comparison Protocols
Secure Multiparty Computation (SMC) has gained tremendous importance with the growth of the Internet and E-commerce, where mutually untrusted parties need to jointly compute a fun...
Florian Kerschbaum, Debmalya Biswas, Sebastiaan de...
109
Voted
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 6 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet