Sciweavers

778 search results - page 21 / 156
» From Public Views to Private Views - Correctness-by-Design f...
Sort
View
WISE
2000
Springer
13 years 11 months ago
Logging and Signing Document-Transfers on the WWW-A Trusted Third Party Gateway
In this work we discuss a service that aims to make quoting of online documents, „web contents“ easy and provable. For that reason we report the conception of a gateway that w...
Andreas Heuer 0002, Frank Losemann, Christoph Mein...
COOPIS
2002
IEEE
14 years 10 days ago
View Propagation and Inconsistency Detection for Cooperative Mobile Agents
Mobile agents are autonomous programs that migrate from one machine to another within a network on behalf of a client, thus, they are ideal for mobile computing environments since ...
Susan Weissman Lauzac, Panos K. Chrysanthis
INTERACT
2003
13 years 8 months ago
Milestones in Time: The Value of Landmarks in Retrieving Information from Personal Stores
: We describe the design and analysis of timeline visualizations for displaying the results of queries on an index of personal content. The visualization was built on top of a pers...
Meredith Ringel, Edward Cutrell, Susan T. Dumais, ...
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 1 months ago
QoS Aware Dynamic Flow Control in Virtual Private Network
— In recent years, IP based Virtual Private Networks (IP-VPNs) which enables enterprises to dynamically create and manage privately owned virtual networks over the public network...
Fariza Sabrina, Glynn Rogers
STOC
1996
ACM
118views Algorithms» more  STOC 1996»
13 years 11 months ago
Characterizing Linear Size Circuits in Terms of Privacy
In this paper we prove a perhaps unexpected relationship between the complexity class of the boolean functions that have linear size circuits, and n-party private protocols. Speci...
Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosé...