Sciweavers

776 search results - page 137 / 156
» Securing user inputs for the web
Sort
View
CRYPTO
2012
Springer
327views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Functional Encryption for Regular Languages
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is associated with a Deterministic Finite Automata (DFA) M....
Brent Waters
OOPSLA
2005
Springer
14 years 2 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
CHI
2010
ACM
14 years 1 months ago
O job can you return my mojo: improving human engagement and enjoyment in routine activities
Unlike machines, we humans are prone to boredom when we perform routine activities for long periods of time. Workers’ mental engagement in boring tasks diminishes, which eventua...
Dvijesh Shastri, Yuichi Fujiki, Ross Buffington, P...
CIIA
2009
13 years 10 months ago
Sharing and Protecting Networked Digital Life Memories
The increasing power of computers, increasing capacity of digital memory and wider availability of a great variety of input devices such as cameras and video recorders, has resulte...
Madjid Merabti
PLDI
2010
ACM
14 years 6 months ago
Ur: Statically-Typed Metaprogramming with Type-Level Record Computation
Dependent types provide a strong foundation for specifying and verifying rich properties of programs through type-checking. The earliest implementations combined dependency, which...
Adam Chlipala