Sciweavers

5392 search results - page 1049 / 1079
» Formalization, User Strategy And Interaction Design: Users
Sort
View
EUROCRYPT
2004
Springer
14 years 11 days ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
NIPS
2008
13 years 10 months ago
Breaking Audio CAPTCHAs
CAPTCHAs are computer-generated tests that humans can pass but current computer systems cannot. CAPTCHAs provide a method for automatically distinguishing a human from a computer ...
Jennifer Tam, Jirí Simsa, Sean Hyde, Luis v...
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
13 years 8 months ago
Expressive and flexible access to web-extracted data: a keyword-based structured query language
Automated extraction of structured data from Web sources often leads to large heterogeneous knowledge bases (KB), with data and schema items numbering in the hundreds of thousands...
Jeffrey Pound, Ihab F. Ilyas, Grant E. Weddell
BMCBI
2008
122views more  BMCBI 2008»
13 years 8 months ago
High-throughput bioinformatics with the Cyrille2 pipeline system
Background: Modern omics research involves the application of high-throughput technologies that generate vast volumes of data. These data need to be pre-processed, analyzed and in...
Mark W. E. J. Fiers, Ate van der Burgt, Erwin Date...
CN
2006
79views more  CN 2006»
13 years 8 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
« Prev « First page 1049 / 1079 Last » Next »