Sciweavers

7179 search results - page 1343 / 1436
» Design for Product Adaptability
Sort
View
COCOON
2011
Springer
12 years 8 months ago
Finding Paths with Minimum Shared Edges
Motivated by a security problem in geographic information systems, we study the following graph theoretical problem: given a graph G, two special nodes s and t in G, and a number k...
Masoud T. Omran, Jörg-Rüdiger Sack, Hami...
EDOC
2011
IEEE
12 years 8 months ago
UML Metamodel-based Workflow Modeling and Execution
—In this paper, we present a UML metamodel-based approach for creating and executing workflow models. The modeling language is introduced through its abstract syntax, and an eval...
Jens Brüning, Martin Gogolla
HUC
2011
Springer
12 years 7 months ago
Exploring micro-incentive strategies for participant compensation in high-burden studies
Micro-incentives represent a new but little-studied trend in participant compensation for user studies. In this paper, we use a combination of statistical analysis and models from...
Mohamed Musthag, Andrew Raij, Deepak Ganesan, Sant...
IACR
2011
137views more  IACR 2011»
12 years 7 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
IACR
2011
105views more  IACR 2011»
12 years 7 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
« Prev « First page 1343 / 1436 Last » Next »