Sciweavers

1662 search results - page 35 / 333
» Privately Finding Specifications
Sort
View
CSREASAM
2008
13 years 8 months ago
Design of an Automatic Password Protection Mechanism for Digital Documents
- Maintaining digital security and privacy are critical issues in the modern workplace. Sensitive and proprietary data is frequently transmitted electronically, and with the large ...
Shashank Kaushik, Thomas Way
CHI
2008
ACM
14 years 7 months ago
Design of human-map system interaction
In this work-in-progress we present some ideas and findings involving map design and human performance. Satellites has once and for all automated geographic positioning and result...
Thomas Porathe, Johannes Prison
HICSS
2009
IEEE
167views Biometrics» more  HICSS 2009»
14 years 2 months ago
E-Commerce and E-Government: How Do They Compare? What Can They Learn from Each Other?
For more than a decade e-Commerce and eGovernment applications have made major impacts in their respective sectors, private and public. Some time ago, we presented early insights ...
Hans Jochen Scholl, Karine Barzilai-Nahon, Jin-Hyu...
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 4 months ago
On Achievable Rates of the Two-user Symmetric Gaussian Interference Channel
We study the Han-Kobayashi (HK) achievable sum rate for the two-user symmetric Gaussian interference channel. We find the optimal power split ratio between the common and private m...
Omar Mehanna, John Marcos, Nihar Jindal
POPL
2002
ACM
14 years 7 months ago
Mining specifications
Program verification is a promising approach to improving program quality, because it can search all possible program executions for specific errors. However, the need to formally...
Glenn Ammons, James R. Larus, Rastislav Bodí...