Sciweavers

3815 search results - page 123 / 763
» An Implementation of Session Types
Sort
View
CADE
2008
Springer
14 years 8 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
WEBI
2009
Springer
14 years 2 months ago
In the Mood to Click? Towards Inferring Receptiveness to Search Advertising
Abstract—We present a method for modeling, and automatically inferring, the current interest of a user in search advertising. Our task is complementary to that of predicting ad r...
Qi Guo, Eugene Agichtein, Charles L. A. Clarke, Az...
MIDDLEWARE
2007
Springer
14 years 2 months ago
Wireless ad hoc VoIP
VoIP is one of the traditional application scenarios for Mobile Ad Hoc Networks (MANETs) in settings such as emergency response. Ideally, VoIP would be transparent to the network ...
Patrick Stuedi, Gustavo Alonso
CHI
2004
ACM
14 years 1 months ago
TNT: a numeric keypad based text input method
With the evolving functionality in television-based (TVbased) information and entertainment appliances, there is an increased need to enable users input text through remote contro...
Magnus Ingmarsson, David Dinka, Shumin Zhai
VISUALIZATION
2002
IEEE
14 years 1 months ago
A Model for the Visualization Exploration Process
The current state of the art in visualization research places a strong emphasis on different techniques to derive insight from disparate types of data. However, little work has in...
T. J. Jankun-Kelly, Kwan-Liu Ma, Michael Gertz