Sciweavers

1516 search results - page 267 / 304
» The Increasing Nvalue Constraint
Sort
View
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 6 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
DEXA
2009
Springer
166views Database» more  DEXA 2009»
15 years 6 months ago
Tags4Tags: Using Tagging to Consolidate Tags
Tagging has become increasingly popular and useful across various social networks and applications. It allows users to classify and organize resources for improving the retrieval p...
Leyla Jael García-Castro, Martin Hepp, Alex...
EMISA
2009
Springer
15 years 6 months ago
A Thing Called "Fluid Process" - Beyond Rigidity in Business Process
: This keynote reports on a new class of processes - so called fluid processes - whose ”engineering” and ”use” is indistinguishable. Fluid processes are continually being ...
Manfred Reichert
ESA
2009
Springer
149views Algorithms» more  ESA 2009»
15 years 6 months ago
On the Power of Uniform Power: Capacity of Wireless Networks with Bounded Resources
Abstract. The throughput capacity of arbitrary wireless networks under the physical Signal to Interference Plus Noise Ratio (SINR) model has received a greater deal of attention in...
Chen Avin, Zvi Lotker, Yvonne Anne Pignolet
MHCI
2009
Springer
15 years 6 months ago
User evaluation of lightweight user authentication with a single tri-axis accelerometer
We report a series of user studies that evaluate the feasibility and usability of light-weight user authentication with a single tri-axis accelerometer. We base our investigation ...
Jiayang Liu, Lin Zhong, Jehan Wickramasuriya, Venu...