Sciweavers

309 search results - page 53 / 62
» Measuring the Effectiveness and the Fairness of Relation Hid...
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
IOLTS
2005
IEEE
163views Hardware» more  IOLTS 2005»
14 years 1 months ago
Modeling Soft-Error Susceptibility for IP Blocks
As device geometries continue to shrink, single event upsets are becoming of concern to a wider spectrum of system designers. These “soft errors” can be a nuisance or catastro...
Robert C. Aitken, Betina Hold
JUCS
2011
153views more  JUCS 2011»
12 years 10 months ago
A Framework to Evaluate Interface Suitability for a Given Scenario of Textual Information Retrieval
: Visualization of search results is an essential step in the textual Information Retrieval (IR) process. Indeed, Information Retrieval Interfaces (IRIs) are used as a link between...
Nicolas Bonnel, Max Chevalier, Claude Chrisment, G...
ATAL
2007
Springer
14 years 2 months ago
Empirical game-theoretic analysis of the TAC Supply Chain game
The TAC Supply Chain Management (TAC/SCM) game presents a challenging dynamic environment for autonomous decision-making in a salient application domain. Strategic interactions co...
Patrick R. Jordan, Christopher Kiekintveld, Michae...
CN
2008
108views more  CN 2008»
13 years 6 months ago
An approach to the identification of network elements composing heterogeneous end-to-end paths
Today's networks are becoming increasingly complex and the ability to effectively and efficiently operate and manage them is ever more challenging. Ways to provide end-to-end...
Alessio Botta, Antonio Pescapè, Giorgio Ven...