Sciweavers

562 search results - page 29 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
ANCS
2007
ACM
15 years 7 months ago
Optimization of pattern matching algorithm for memory based architecture
Due to the advantages of easy re-configurability and scalability, the memory-based string matching architecture is widely adopted by network intrusion detection systems (NIDS). In...
Cheng-Hung Lin, Yu-Tang Tai, Shih-Chieh Chang
HCI
2009
15 years 1 months ago
The Five Commandments of Activity-Aware Ubiquitous Computing Applications
Recent work demonstrates the potential for extracting patterns from users' behavior as detected by sensors. Since there is currently no generalized framework for reasoning abo...
Nasim Mahmud, Jo Vermeulen, Kris Luyten, Karin Con...
114
Voted
OOPSLA
2007
Springer
15 years 10 months ago
Recursive adaptive computations using perobject visitors
Adaptive Programming allows developers to write structureshy programs. However, in Adaptive Programming, recursive computations are known to require a good deal of boiler plate co...
Ahmed Abdelmeged, Karl J. Lieberherr
CCS
2008
ACM
15 years 5 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
CHI
2007
ACM
16 years 4 months ago
Sharing a single expert among multiple partners
Expertise to assist people on complex tasks is often in short supply. One solution to this problem is to design systems that allow remote experts to help multiple people in simult...
Jeffrey Wong, Lui Min Oh, Jiazhi Ou, Carolyn Penst...