Sciweavers

5722 search results - page 261 / 1145
» Security Function Interactions
Sort
View
CHI
2011
ACM
14 years 6 months ago
In the shadow of misperception: assistive technology use and social interactions
Few research studies focus on how the use of assistive technologies is affected by social interaction among people. We present an interview study of 20 individuals to determine ho...
Kristen Shinohara, Jacob O. Wobbrock
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
15 years 7 months ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård
FIW
1994
15 years 4 months ago
Towards automated detection of feature interactions
The feature interaction problem occurs when the addition of a new feature to a system disrupts the existing services and features. This paper describes a tabular notation for spec...
Kenneth H. Braithwaite, Joanne M. Atlee
ECEASST
2008
82views more  ECEASST 2008»
15 years 3 months ago
Interaction nets: programming language design and implementation
: This paper presents a compiler for interaction nets, which, just like term rewriting systems, are user-definable rewrite systems which offer the ability to specify and program. I...
Abubakar Hassan, Ian Mackie, Shinya Sato
ICSM
2002
IEEE
15 years 8 months ago
From Legacy to Web through Interaction Modeling
In the context of the CelLEST project, we have been investigating the problem of reengineering and reusing the services provided by legacy applications, running on mainframe hosts...
Eleni Stroulia, Mohammad El-Ramly, Paul G. Sorenso...