Sciweavers

4359 search results - page 160 / 872
» Automated Pipeline Design
Sort
View
IFIP
2009
Springer
15 years 1 months ago
On the Automated Correction of Protocols with Improper Message Encoding
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Dieter Hutter, Raul Monroy
CHI
2003
ACM
16 years 3 months ago
Mr.Web: an automated interactive webmaster
This paper describes a system, Mr.Web, designed to interact with users over email to create and update Web pages. Our goal is that users interact with Mr.Web as if it were a human...
Andrea Lockerd, Huy Pham, Taly Sharon, Ted Selker
118
Voted
CCS
2005
ACM
15 years 9 months ago
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. Thi...
Qiang Huang, David Jao, Helen J. Wang
135
Voted
IUI
2004
ACM
15 years 8 months ago
FAIM: integrating automated facial affect analysis in instant messaging
One of the limitations in traditional instant messaging platforms is that they predominantly rely on text messages as the primary form of expression. This paper presents FAIM, an ...
Rana El Kaliouby, Peter Robinson
160
Voted
ASWEC
2004
IEEE
15 years 7 months ago
An Environment for Automated Performance Evaluation of J2EE and ASP.NET Thin-client Architectures
Assessing the likely run-time performance of applications using thin-client architectures during their design is very difficult. We describe SoftArch/Thin, a thin-client test-bed ...
John C. Grundy, Zhong Wei, Radu Nicolescu, Yuhong ...