Sciweavers

5392 search results - page 1049 / 1079
» Formalization, User Strategy And Interaction Design: Users
Sort
View
131
Voted
EUROCRYPT
2004
Springer
15 years 7 months ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
143
Voted
NIPS
2008
15 years 5 months ago
Breaking Audio CAPTCHAs
CAPTCHAs are computer-generated tests that humans can pass but current computer systems cannot. CAPTCHAs provide a method for automatically distinguishing a human from a computer ...
Jennifer Tam, Jirí Simsa, Sean Hyde, Luis v...
153
Voted
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
15 years 3 months ago
Expressive and flexible access to web-extracted data: a keyword-based structured query language
Automated extraction of structured data from Web sources often leads to large heterogeneous knowledge bases (KB), with data and schema items numbering in the hundreds of thousands...
Jeffrey Pound, Ihab F. Ilyas, Grant E. Weddell
157
Voted
BMCBI
2008
122views more  BMCBI 2008»
15 years 3 months ago
High-throughput bioinformatics with the Cyrille2 pipeline system
Background: Modern omics research involves the application of high-throughput technologies that generate vast volumes of data. These data need to be pre-processed, analyzed and in...
Mark W. E. J. Fiers, Ate van der Burgt, Erwin Date...
107
Voted
CN
2006
79views more  CN 2006»
15 years 3 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
« Prev « First page 1049 / 1079 Last » Next »