Sciweavers

419 search results - page 40 / 84
» Realizing the Potential of AIED
Sort
View
DIS
2005
Springer
14 years 2 months ago
The Arrowsmith Project: 2005 Status Report
In the 1980s, Don Swanson proposed the concept of “undiscovered public knowledge,” and published several examples in which two disparate literatures (i.e., sets of articles hav...
Neil R. Smalheiser
SIGMETRICS
1997
ACM
164views Hardware» more  SIGMETRICS 1997»
14 years 25 days ago
File Server Scaling with Network-Attached Secure Disks
By providing direct data transfer between storage and client, network-attached storage devices have the potential to improve scalability for existing distributed file systems (by...
Garth A. Gibson, David Nagle, Khalil Amiri, Fay W....
WWW
2007
ACM
14 years 9 months ago
The two cultures: mashing up web 2.0 and the semantic web
A common perception is that there are two competing visions for the future evolution of the Web: the Semantic Web and Web 2.0. A closer look, though, reveals that the core technol...
Anupriya Ankolekar, Markus Krötzsch, Thanh Tr...
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 3 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
FDTC
2009
Springer
126views Cryptology» more  FDTC 2009»
14 years 3 months ago
WDDL is Protected against Setup Time Violation Attacks
—In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful t...
Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Ta...