Sciweavers

2421 search results - page 88 / 485
» Message from the Editor-in-Chief
Sort
View
ICS
2010
Tsinghua U.
14 years 7 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
SECON
2008
IEEE
14 years 4 months ago
Fast Exclusion of Errant Devices from Vehicular Networks
—Vehicular networks, in which cars communicate wirelessly to exchange information on traffic conditions, offer a promising way to improve road safety. Yet ensuring the correct f...
Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis...
ICDE
2007
IEEE
94views Database» more  ICDE 2007»
14 years 11 months ago
RoXSum: Leveraging Data Aggregation and Batch Processing for XML Routing
Content-based routing is the primary form of communication within publish/subscribe systems. In those systems data transmission is performed by sophisticated overlay networks of c...
Zografoula Vagena, Mirella Moura Moro, Vassilis J....
STOC
2009
ACM
91views Algorithms» more  STOC 2009»
14 years 10 months ago
Inaccessible entropy
We put forth a new computational notion of entropy, which measures the (in)feasibility of sampling high entropy strings that are consistent with a given protocol. Specifically, we...
Iftach Haitner, Omer Reingold, Salil P. Vadhan, Ho...
CHI
2009
ACM
14 years 4 months ago
Butler lies: awareness, deception and design
Instant messaging (IM) is a common and popular way for co-workers, friends, and family to stay in touch, but its “always-on” properties can sometimes lead people to feel overe...
Jeffrey T. Hancock, Jeremy P. Birnholtz, Natalya N...