Sciweavers

959 search results - page 144 / 192
» Possible and Necessary h-Indices
Sort
View
ISW
2007
Springer
14 years 1 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
FOCS
2006
IEEE
14 years 1 months ago
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
Michael Ben-Or, Claude Crépeau, Daniel Gott...
ISESE
2006
IEEE
14 years 1 months ago
A goal question metric based approach for efficient measurement framework definition
In software engineering, measurements can be used to monitor, understand and improve software processes as well as products and resource utilization. Commonly, measurement framewo...
Patrik Berander, Per Jönsson
MM
2004
ACM
116views Multimedia» more  MM 2004»
14 years 1 months ago
A taxonomy for multimedia service composition
The realization of multimedia systems still heavily relies on building monolithic systems that need to be reengineered for every change in the application and little of which can ...
Klara Nahrstedt, Wolf-Tilo Balke
PSD
2004
Springer
108views Database» more  PSD 2004»
14 years 1 months ago
Developing Adoptable Disclosure Protection Techniques: Lessons Learned from a U.S. Experience
The development of new disclosure protection techniques is useful only insofar as those techniques are adopted by statistical agencies. In order for technical experts in disclosure...
Nicholas H. Greenia