Sciweavers

973 search results - page 53 / 195
» Usability: not as we know it!
Sort
View
FOSSACS
2009
Springer
15 years 3 months ago
Interprocedural Dataflow Analysis over Weight Domains with Infinite Descending Chains
We study generalized fixed-point equations over idempotent semirings and provide an efficient algorithm for the detection whether a sequence of Kleene's iterations stabilizes ...
Morten Kühnrich, Stefan Schwoon, Jirí ...
FGCS
2006
70views more  FGCS 2006»
14 years 12 months ago
GrAL--the grid algorithms library
6 Dedicated library support for mesh-level geometry components, central to numerical PDE solution, is scarce. We claim that the situation is due to the inadequacy of traditional de...
Guntram Berti
EUROCRYPT
2010
Springer
15 years 4 months ago
Adaptively Secure Broadcast
A broadcast protocol allows a sender to distribute a message through a point-to-point network to a set of parties, such that (i) all parties receive the same message, even if the s...
Martin Hirt, Vassilis Zikas
PERCOM
2006
ACM
15 years 11 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
ACSAC
2009
IEEE
15 years 6 months ago
The Design of a Trustworthy Voting System
– After the voting debacle in the Florida Presidential election of 2000 with its now-fabled hanging chads and pregnant chads, many voting jurisdictions turned to electronic votin...
Nathanael Paul, Andrew S. Tanenbaum