Sciweavers

419 search results - page 65 / 84
» Realizing the Potential of AIED
Sort
View
COMPSAC
2011
IEEE
12 years 8 months ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...
WECWIS
2006
IEEE
151views ECommerce» more  WECWIS 2006»
14 years 2 months ago
Registering UMM Business Collaboration Models in an ebXML Registry
UN/CEFACT’s modeling methodology (UMM) is used to develop global choreographies of inter-organizational business processes. UMM models should be publically available in order to...
Birgit Hofreiter, Christian Huemer, Marco Zapletal
ISLPED
2006
ACM
128views Hardware» more  ISLPED 2006»
14 years 2 months ago
Design and power management of energy harvesting embedded systems
Harvesting energy from the environment is a desirable and increasingly important capability in several emerging applications of embedded systems such as sensor networks, biomedica...
Vijay Raghunathan, Pai H. Chou
MOBICOM
2006
ACM
14 years 2 months ago
Characterizing multi-way interference in wireless mesh networks
Wireless mesh networks (WMNs) have been proposed as a solution for ubiquitous last-mile broadband access. A critical limiting factor for many WMN protocols in realizing their thro...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...
SOUPS
2006
ACM
14 years 2 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten