Sciweavers

6300 search results - page 86 / 1260
» We have it easy, but do we have it right
Sort
View
DRM
2008
Springer
15 years 3 months ago
RSA-TBOS signcryption with proxy re-encryption
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
Varad Kirtane, C. Pandu Rangan
IWC
2006
82views more  IWC 2006»
15 years 1 months ago
Usability professionals - current practices and future development
The usability concept has now received such a wide recognition in information technology (IT) development that working with usability can be regarded as a profession in its own ri...
Jan Gulliksen, Inger Boivie, Bengt Göransson
WWW
2009
ACM
16 years 1 months ago
Automated construction of web accessibility models from transaction click-streams
Screen readers, the dominant assistive technology used by visually impaired people to access the Web, function by speaking out the content of the screen serially. Using screen rea...
Jalal Mahmud, Yevgen Borodin, I. V. Ramakrishnan, ...
AIML
2008
15 years 2 months ago
Valentini's cut-elimination for provability logic resolved
In 1983, Valentini presented a syntactic proof of cut-elimination for a sequent calculus GLSV for the provability logic GL where we have added the subscript V for "Valentini&q...
Rajeev Goré, Revantha Ramanayake
RE
2001
Springer
15 years 5 months ago
Reconciling Software Requirements and Architectures: The CBSP Approach
Little guidance and few methods are available to refine a set of software requirements into an architecture satisfying those requirements. Part of the challenge stems from the fac...
Paul Grünbacher, Alexander Egyed, Nenad Medvi...