Sciweavers

4731 search results - page 165 / 947
» Securing Interactive Programs
Sort
View
OOPSLA
1995
Springer
14 years 18 days ago
Annotating Objects for Transport to Other Worlds
In Self 4.0, people write programs by directly constructing webs of objects in a larger world of objects. But in order to save or share these programs, the objects must be moved t...
David Ungar
ICALP
2007
Springer
13 years 11 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
IUI
2000
ACM
14 years 1 months ago
APE: learning user's habits to automate repetitive tasks
The APE (Adaptive Programming Environment) project focuses on applying Machine Learning techniques to embed a software assistant into the VisualWorks Smalltalk interactive program...
Jean-David Ruvini, Christophe Dony
FASE
2005
Springer
14 years 2 months ago
Improving System Understanding via Interactive, Tailorable, Source Code Analysis
In situations in which developers are not familiar with a system or its documentation is inadequate, the system’s source code becomes the only reliable source of information. Unf...
Vladimir Jakobac, Alexander Egyed, Nenad Medvidovi...
CHI
2010
ACM
14 years 3 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...