Sciweavers

3000 search results - page 561 / 600
» Accessing an Information System by Chatting
Sort
View
IFL
2004
Springer
122views Formal Methods» more  IFL 2004»
14 years 1 months ago
Source-Based Trace Exploration
Abstract. Tracing a computation is a key method for program comprehension and debugging. Hat is a tracing system for Haskell 98 programs. During a computation a trace is recorded i...
Olaf Chitil
EUROCRYPT
2010
Springer
14 years 16 days ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
CCS
2009
ACM
14 years 11 days ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
ICSE
2001
IEEE-ACM
14 years 5 days ago
Workshop on Software Engineering and Mobility
Mobility is redefining the hardware and software fabric of distributed systems. Wireless communication allows network hosts to participate in a distributed computation while on t...
Gruia-Catalin Roman, Gian Pietro Picco
ICETE
2004
210views Business» more  ICETE 2004»
13 years 9 months ago
Knowledge and Content-Based Audio Retrieval Using Wordnet
: Sound producers create the sound that goes along the image in cinema and video productions, as well as spots and documentaries. Some sounds are recorded for the occasion. Many oc...
Pedro Cano, Markus Koppenberger, Sylvain Le Groux,...