Sciweavers

2061 search results - page 300 / 413
» Authorization for Metacomputing Applications
Sort
View
HUC
2010
Springer
15 years 5 months ago
Serendipitous family stories: using findings from a study on family communication to share family history
Storytelling and sharing family histories are important parts of what it means to "be" a family. Based on results from a study on intergenerational communication over a ...
Frank R. Bentley, Sujoy Kumar Chowduhry
CCS
2010
ACM
15 years 4 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
CCS
2010
ACM
15 years 4 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
TEI
2010
ACM
129views Hardware» more  TEI 2010»
15 years 4 months ago
Silent mutations: physical-digital interactions in spaces
Many installations research efforts today explore how to engage participants with embedded digital content and applications in interactive environments. Yet the interactive design...
Claudia Rébola Winegarden, Nicholas Komor, ...
ADVCS
2008
140views more  ADVCS 2008»
15 years 4 months ago
Reputation for Innovating Social Networks
Reputation is a fundamental instrument of partner selection. Developed within the domain of electronic auctions, reputation technology is being been imported into other applicatio...
Rosaria Conte, Mario Paolucci, Jordi Sabater-Mir