Sciweavers

42 search results - page 7 / 9
» Testing the executability of scenarios in general inhibitor ...
Sort
View
CHI
2011
ACM
14 years 1 months ago
Feedlack detects missing feedback in web applications
While usability methods such as user studies and inspections can reveal a wide range of problems, they do so for only a subset of an application’s features and states. We presen...
Andrew J. Ko, Xing Zhang
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
15 years 10 months ago
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication
Recently, the new Multibase Non-Adjacent Form (mbNAF) method was introduced and shown to speed up the execution of the scalar multiplication with an efficient use of multiple bases...
Patrick Longa, Catherine H. Gebotys
PLDI
2010
ACM
15 years 6 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy
77
Voted
ATAL
2005
Springer
15 years 3 months ago
AmbieAgents: a scalable infrastructure for mobile and context-aware information services
Context-aware information systems for mobile users have to cope with a variety of requirements in order to be able to provide an added value that goes beyond simply location-based...
Till Christopher Lech, Leendert W. M. Wienhofen
GECCO
2005
Springer
155views Optimization» more  GECCO 2005»
15 years 3 months ago
Mission planning for joint suppression of enemy air defenses using a genetic algorithm
In this paper we present a genetic algorithm applied to the problem of mission planning for Joint Suppression of Enemy Air Defenses (JSEAD) in support of air strike operations. Th...
Jeffrey P. Ridder, Jason C. HandUber