Sciweavers

1029 search results - page 153 / 206
» Dependence Anti Patterns
Sort
View
CGI
2004
IEEE
14 years 2 months ago
Exploring Collaboration with Group Pointer Interaction
Enabling group collaboration is important in computer graphics today. We have developed a framework that supports multiple pointing devices to explore the collaborative utility of...
Florian Vogt, Justin Wong, Barry A. Po, Ritchie Ar...
CCS
2006
ACM
14 years 2 months ago
Puppetnets: misusing web browsers as a distributed attack infrastructure
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat ...
V. T. Lam, Spyros Antonatos, Periklis Akritidis, K...
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
14 years 2 months ago
Non-linear Residue Codes for Robust Public-Key Arithmetic
We present a scheme for robust multi-precision arithmetic over the positive integers, protected by a novel family of non-linear arithmetic residue codes. These codes have a very hi...
Gunnar Gaubatz, Berk Sunar, Mark G. Karpovsky
FSTTCS
2000
Springer
14 years 2 months ago
Text Sparsification via Local Maxima
In this paper we investigate some properties and algorithms related to a text sparsification technique based on the identification of local maxima in the given string. As the numb...
Pierluigi Crescenzi, Alberto Del Lungo, Roberto Gr...
ISN
1995
Springer
14 years 1 months ago
Counting the Costs and Benefits of Metaphor
It has been demonstrated that the use of suitable metaphors in the user service interface can have a dramatic effect on the way in which the user perceives the services, depending ...
Chris Condon, Stephan Keuneke