Sciweavers

11862 search results - page 2279 / 2373
» Relative information completeness
Sort
View
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
14 years 2 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
VIZSEC
2005
Springer
14 years 2 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...
ACMDIS
2004
ACM
14 years 2 months ago
Making tea: iterative design through analogy
The success of translating an analog or manual practice into a digital interactive system may depend on how well that translation captures not only the functional what and how asp...
Monica M. C. Schraefel, Gareth V. Hughes, Hugo R. ...
ACMMSP
2004
ACM
131views Hardware» more  ACMMSP 2004»
14 years 2 months ago
Reuse-distance-based miss-rate prediction on a per instruction basis
Feedback-directed optimization has become an increasingly important tool in designing and building optimizing compilers. Recently, reuse-distance analysis has shown much promise i...
Changpeng Fang, Steve Carr, Soner Önder, Zhen...
ASSETS
2004
ACM
14 years 2 months ago
Accessibility designer: visualizing usability for the blind
These days, accessibility-related regulations and guidelines have been accelerating the improvement of Web accessibility. One of the accelerating factors is the development and de...
Hironobu Takagi, Chieko Asakawa, Kentarou Fukuda, ...
« Prev « First page 2279 / 2373 Last » Next »