Sciweavers

3228 search results - page 371 / 646
» Computationally Sound Proofs
Sort
View
ICALP
2005
Springer
15 years 9 months ago
Password-Based Encryption Analyzed
Abstract. The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the cont...
Martín Abadi, Bogdan Warinschi
95
Voted
HUC
2009
Springer
15 years 8 months ago
Sonar-based measurement of user presence and attention
We describe a technique to detect the presence of computer users. This technique relies on sonar using hardware that already exists on commodity laptop computers and other electro...
Stephen P. Tarzia, Robert P. Dick, Peter A. Dinda,...
GROUP
1999
ACM
15 years 8 months ago
"Making place" to make IT work: empirical explorations of HCI for mobile CSCW
This paper addresses issues of user interface design, relating to ease of use, of handheld CSCW. In particular, we are concerned with the requirements that arise from situations i...
Steinar Kristoffersen, Fredrik Ljungberg
PPSC
1993
15 years 5 months ago
I/O for TFLOPS Supercomputers
Scalable parallel computers with TFLOPS (Trillion FLoating Point Operations Per Second) performance levels are now under construction. While we believe TFLOPS processor technology...
Erik DeBenedictis, Stephen C. Johnson
LATA
2009
Springer
15 years 10 months ago
Termination of Priority Rewriting
Introducing priorities on rules in rewriting increases their expressive power and helps to limit computations. Priority rewriting is used in rule-based programming as well as in f...
Isabelle Gnaedig