Sciweavers

4592 search results - page 711 / 919
» Framework for Studying Substitution
Sort
View
CHIMIT
2008
ACM
14 years 4 days ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
CRYPTO
2008
Springer
150views Cryptology» more  CRYPTO 2008»
14 years 4 days ago
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Abstract. The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest possible" notion of security for...
Alexandra Boldyreva, Serge Fehr, Adam O'Neill
CSCW
2008
ACM
14 years 4 days ago
Transactive memory in trauma resuscitation
This paper describes an ethnographic study conducted to explore the possibilities for future design and development of technological support for trauma teams. We videotaped 10 tra...
Aleksandra Sarcevic, Ivan Marsic, Michael E. Lesk,...
DAWAK
2008
Springer
14 years 3 days ago
Mining Multidimensional Sequential Patterns over Data Streams
Sequential pattern mining is an active field in the domain of knowledge discovery and has been widely studied for over a decade by data mining researchers. More and more, with the ...
Chedy Raïssi, Marc Plantevit
ESWS
2008
Springer
14 years 3 days ago
Building a Semantic Web Image Repository for Biological Research Images
Abstract. Images play a vital role in scientific studies. An image repository would become a costly and meaningless data graveyard without descriptive metadata. We adapted EPrints,...
Jun Zhao, Graham Klyne, David M. Shotton