Sciweavers

998 search results - page 56 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
RAID
2009
Springer
14 years 3 months ago
VirusMeter: Preventing Your Cellphone from Spies
Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growi...
Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen
CHI
2010
ACM
14 years 1 months ago
FrameWire: a tool for automatically extracting interaction logic from paper prototyping tests
Paper prototyping offers unique affordances for interface design. However, due to its spontaneous nature and the limitations of paper, it is difficult to distill and communicate a...
Yang Li, Xiang Cao, Katherine Everitt, Morgan Dixo...
ARESEC
2011
117views more  ARESEC 2011»
12 years 8 months ago
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots
—Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely o...
Yves Igor Jerschow, Martin Mauve
INFOCOM
2011
IEEE
13 years 7 days ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
CONCURRENCY
2000
123views more  CONCURRENCY 2000»
13 years 8 months ago
A mobile agent based push methodology for global parallel computing
The 1990s are seeing the explosive growth of the Internet and Web-based information sharing and dissemination systems. The Internet is also showing a potential of forming of a sup...
Cheng-Zhong Xu, Brian Wims