Sciweavers

101 search results - page 8 / 21
» A User Interface for a Game-Based Protocol Verification Tool
Sort
View
MOBICOM
2006
ACM
14 years 1 months ago
The design, deployment, and analysis of signetLab: a sensor network testbed and interactive management tool
Abstract-The emergence of small, inexpensive, networkcapable sensing devices led to a great deal of research on the design and implementation of sensor networks. A critical step in...
Riccardo Crepaldi, Simone Friso, Albert F. Harris ...
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 9 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
ACSAC
1999
IEEE
14 years 2 days ago
Using Checkable Types in Automatic Protocol Analysis
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Stephen H. Brackin
GROUP
1997
ACM
13 years 12 months ago
CEVA: a tool for collaborative video analysis
Video protocol analysis is a standard technique in many research disciplines including human-computerinteraction and computer supported cooperative work. It is notoriously time co...
Andy Cockburn, Tony Dale
BCSHCI
2007
13 years 9 months ago
Use study on a home video editing system
To help consumers dealing with their growing amount of home video, we have developed the Edit While Watching (EWW) system. It is designed to automatically create an edited version...
Hans Weda, Marco Campanella