Sciweavers

1679 search results - page 236 / 336
» Strong order equivalence
Sort
View
CHI
2009
ACM
14 years 9 months ago
Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust
This paper examines a visual design element unique to situated, hot-spot style, services: locativeness. This is the extent to which the media representing a service relates to its...
Vassilis Kostakos, Ian Oakley
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
14 years 9 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
KDD
2007
ACM
148views Data Mining» more  KDD 2007»
14 years 9 months ago
Scalable look-ahead linear regression trees
Most decision tree algorithms base their splitting decisions on a piecewise constant model. Often these splitting algorithms are extrapolated to trees with non-constant models at ...
David S. Vogel, Ognian Asparouhov, Tobias Scheffer
POPL
2004
ACM
14 years 9 months ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette
SIGMOD
2004
ACM
126views Database» more  SIGMOD 2004»
14 years 9 months ago
StreaMon: An Adaptive Engine for Stream Query Processing
StreaMon is the adaptive query processing engine of the STREAM prototype Data Stream Management System (DSMS) [4]. A fundamental challenge in many DSMS applications (e.g., network...
Shivnath Babu, Jennifer Widom