Sciweavers

5722 search results - page 186 / 1145
» Security Function Interactions
Sort
View
118
Voted
ICML
2000
IEEE
16 years 3 months ago
Learning Subjective Functions with Large Margins
In manyoptimization and decision problems the objective function can be expressed as a linear combinationof competingcriteria, the weights of whichspecify the relative importanceo...
Claude-Nicolas Fiechter, Seth Rogers
99
Voted
VL
2009
IEEE
156views Visual Languages» more  VL 2009»
15 years 9 months ago
Non-programmers identifying functionality in unfamiliar code: Strategies and barriers
Source code on the web is a widely available and potentially rich learning resource for nonprogrammers. However, unfamiliar code can be daunting to end-users without programming e...
Paul A. Gross, Caitlin Kelleher
ACMDIS
2004
ACM
15 years 7 months ago
Communication functions and the adaptation of design representations in interdisciplinary teams
Design representations in user-centered design serve intentions for directing design process and communication functions for enlisting interdisciplinary participation. To disentan...
David G. Hendry
94
Voted
DEXAW
2009
IEEE
124views Database» more  DEXAW 2009»
15 years 9 months ago
Performance Comparison of Secure Comparison Protocols
Secure Multiparty Computation (SMC) has gained tremendous importance with the growth of the Internet and E-commerce, where mutually untrusted parties need to jointly compute a fun...
Florian Kerschbaum, Debmalya Biswas, Sebastiaan de...
119
Voted
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 8 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet