Sciweavers

7179 search results - page 1343 / 1436
» Design for Product Adaptability
Sort
View
330
Voted
COCOON
2011
Springer
14 years 3 months ago
Finding Paths with Minimum Shared Edges
Motivated by a security problem in geographic information systems, we study the following graph theoretical problem: given a graph G, two special nodes s and t in G, and a number k...
Masoud T. Omran, Jörg-Rüdiger Sack, Hami...
154
Voted
EDOC
2011
IEEE
14 years 3 months ago
UML Metamodel-based Workflow Modeling and Execution
—In this paper, we present a UML metamodel-based approach for creating and executing workflow models. The modeling language is introduced through its abstract syntax, and an eval...
Jens Brüning, Martin Gogolla
129
Voted
HUC
2011
Springer
14 years 3 months ago
Exploring micro-incentive strategies for participant compensation in high-burden studies
Micro-incentives represent a new but little-studied trend in participant compensation for user studies. In this paper, we use a combination of statistical analysis and models from...
Mohamed Musthag, Andrew Raij, Deepak Ganesan, Sant...
128
Voted
IACR
2011
137views more  IACR 2011»
14 years 3 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
IACR
2011
105views more  IACR 2011»
14 years 3 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
« Prev « First page 1343 / 1436 Last » Next »