Sciweavers

15840 search results - page 2984 / 3168
» The Control of Synchronous Systems
Sort
View
CCS
2011
ACM
14 years 4 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum
CIKM
2011
Springer
14 years 4 months ago
Worker types and personality traits in crowdsourcing relevance labels
Crowdsourcing platforms offer unprecedented opportunities for creating evaluation benchmarks, but suffer from varied output quality from crowd workers who possess different levels...
Gabriella Kazai, Jaap Kamps, Natasa Milic-Frayling
CSFW
2011
IEEE
14 years 4 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
160
Voted
ICC
2011
IEEE
199views Communications» more  ICC 2011»
14 years 4 months ago
Equal-Sized Cells Mean Equal-Sized Packets in Tor?
Abstract—Tor is a well-known low-latency anonymous communication system. To prevent the traffic analysis attack, Tor packs application data into equal-sized cells. However, we f...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu
IUI
2012
ACM
14 years 13 days ago
A visual programming language for designing interactions embedded in web-based geographic applications
Visual programming languages (VPLs) provide notations for representing both the intermediate and the final results of a knowledge engineering process. Whereas some VPLs particula...
The Nhan Luong, Patrick Etcheverry, Christophe Mar...
« Prev « First page 2984 / 3168 Last » Next »