Sciweavers

780 search results - page 123 / 156
» Introduction to the Special Issue
Sort
View
ISCA
2003
IEEE
123views Hardware» more  ISCA 2003»
14 years 27 days ago
Detecting Global Stride Locality in Value Streams
Value prediction exploits localities in value streams. Previous research focused on exploiting two types of value localities, computational and context-based, in the local value h...
Huiyang Zhou, Jill Flanagan, Thomas M. Conte
WPES
2003
ACM
14 years 26 days ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
AGENTS
1997
Springer
13 years 11 months ago
An Intelligent Assistant for Patient Health Care
The Patient Advocate is designed to be an intelligent assistant for patient-centered health care. Residing on a home computer or special-purpose device and operating within an ext...
Silvia Miksch, Kenneth Cheng, Barbara Hayes-Roth
HT
1993
ACM
13 years 11 months ago
Concurrency Control in Collaborative Hypertext Systems
Traditional concurrency control techniques for database systems (transaction management based on locking protocols) have been successful in many multiuser settings, but these tech...
Uffe Kock Wiil, John J. Leggett
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner