Sciweavers

2821 search results - page 22 / 565
» Tracing a single user
Sort
View
CCS
2008
ACM
13 years 11 months ago
Traitor tracing with constant size ciphertext
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create the box. We present a traitor tracing system where ciphertex...
Dan Boneh, Moni Naor
SIGSOFT
2010
ACM
13 years 7 months ago
Using dynamic analysis to create trace-focused user interfaces for IDEs
This research demonstration presents the tool, Dynamic Interactive Views for Reverse Engineering (Diver). Diver supports software understanding through a trace focused user interf...
Del Myers, Margaret-Anne D. Storey
UM
2010
Springer
13 years 7 months ago
Interweaving Public User Profiles on the Web
While browsing the Web, providing profile information in social networking services, or tagging pictures, users leave a plethora of traces. In this paper, we analyze the nature of ...
Fabian Abel, Nicola Henze, Eelco Herder, Daniel Kr...
ENTCS
2006
124views more  ENTCS 2006»
13 years 9 months ago
Generic Trace Theory
Trace semantics has been defined for various non-deterministic systems with different input/output types, or with different types of "non-determinism" such as classical ...
Ichiro Hasuo, Bart Jacobs, Ana Sokolova
JSSPP
2010
Springer
13 years 7 months ago
Risk Aware Overbooking for Commercial Grids
Abstract. The commercial exploitation of the emerging Grid and Cloud markets needs SLAs to sell computing run times. Job traces show that users have a limited ability to estimate t...
Georg Birkenheuer, André Brinkmann, Holger ...