Sciweavers

325 search results - page 60 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
CORR
2011
Springer
213views Education» more  CORR 2011»
13 years 2 months ago
Liquidsoap: a High-Level Programming Language for Multimedia Streaming
Generating multimedia streams, such as in a netradio, is a task which is complex and difficult to adapt to every users’ needs. We introduce a novel approach in order to achieve i...
David Baelde, Romain Beauxis, Samuel Mimram
SOUPS
2006
ACM
14 years 1 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat
BMCBI
2010
102views more  BMCBI 2010»
13 years 2 months ago
Predicting protein-protein interactions in unbalanced data using the primary structure of proteins
Background: Elucidating protein-protein interactions (PPIs) is essential to constructing protein interaction networks and facilitating our understanding of the general principles ...
Chi-Yuan Yu, Lih-Ching Chou, Darby Tien-Hao Chang
CHI
2011
ACM
12 years 11 months ago
No clicks, no problem: using cursor movements to understand and improve search
Understanding how people interact with search engines is important in improving search quality. Web search engines typically analyze queries and clicked results, but these actions...
Jeff Huang, Ryen W. White, Susan T. Dumais